File name:

XMPSetupKankan.exe

Full analysis: https://app.any.run/tasks/6844e1e6-9f82-488b-af0b-ee42f304d4a5
Verdict: Malicious activity
Analysis date: September 07, 2024, 10:05:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1233C6ABAA32971CA49597373485F6F0

SHA1:

339B7E979BDB64AFF037BE8FB2982BB88E78371D

SHA256:

94D6A3E72E8E3479FCF2B3D71ED0E2B91B483C60BE298144B41089A61F296055

SSDEEP:

196608:gmTaTPgmdViv/bUbwuuljNPmiX2ghz1PBU+vE9vcidTaBMV:gmebk/gbtmhmiX2gz589vcUa2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • XMPSetupKankan.exe (PID: 6984)
    • Reads security settings of Internet Explorer

      • XMPSetupKankan.exe (PID: 6984)
    • Process drops legitimate windows executable

      • XMPSetupKankan.exe (PID: 6984)
    • Executable content was dropped or overwritten

      • XMPSetupKankan.exe (PID: 6984)
  • INFO

    • Checks supported languages

      • XMPSetupKankan.exe (PID: 6984)
    • Creates files in the program directory

      • XMPSetupKankan.exe (PID: 6984)
    • Create files in a temporary directory

      • XMPSetupKankan.exe (PID: 6984)
    • Reads the computer name

      • XMPSetupKankan.exe (PID: 6984)
    • Creates files or folders in the user directory

      • XMPSetupKankan.exe (PID: 6984)
    • Checks proxy server information

      • XMPSetupKankan.exe (PID: 6984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (54.3)
.exe | Win64 Executable (generic) (34.8)
.exe | Win32 Executable (generic) (5.6)
.exe | Generic Win/DOS Executable (2.5)
.exe | DOS Executable Generic (2.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:05:04 02:54:31+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 238080
InitializedDataSize: 29401600
UninitializedDataSize: -
EntryPoint: 0x232ae
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 5.2.18.5894
ProductVersionNumber: 5.2.18.5894
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileDescription: 迅雷影音 安装程序
FileVersion: 5, 2, 18, 5894
InternalName: XMPSetup
LegalCopyright: Copyright (c) 2003-2017 深圳市迅雷网络技术有限公司
OriginalFileName: XMPSetup.exe
ProductName: 迅雷影音 安装程序
ProductVersion: 5, 2, 18, 5894
CompanyName: 深圳市迅雷网络技术有限公司
LegalTrademarks: Xunlei
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
113
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start xmpsetupkankan.exe xmpsetupkankan.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4784"C:\Users\admin\Desktop\XMPSetupKankan.exe" C:\Users\admin\Desktop\XMPSetupKankan.exeexplorer.exe
User:
admin
Company:
深圳市迅雷网络技术有限公司
Integrity Level:
MEDIUM
Description:
迅雷影音 安装程序
Exit code:
3221226540
Version:
5, 2, 18, 5894
Modules
Images
c:\users\admin\desktop\xmpsetupkankan.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6984"C:\Users\admin\Desktop\XMPSetupKankan.exe" C:\Users\admin\Desktop\XMPSetupKankan.exe
explorer.exe
User:
admin
Company:
深圳市迅雷网络技术有限公司
Integrity Level:
HIGH
Description:
迅雷影音 安装程序
Version:
5, 2, 18, 5894
Modules
Images
c:\users\admin\desktop\xmpsetupkankan.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
478
Read events
471
Write events
7
Delete events
0

Modification events

(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:C:\Users\admin\Desktop\XMPSetupKankan.exe
Value:
1
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:SIGN.IE=01C48E90 XMPSetupKankan.exe
Value:
1
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
Operation:writeName:SIGN.MEDIA=10C1A20 XMPSetupKankan.exe
Value:
1
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6984) XMPSetupKankan.exeKey:HKEY_CURRENT_USER\SOFTWARE\Thunder Network\Xmp
Operation:writeName:allowplaysubtype
Value:
Executable files
135
Suspicious files
66
Text files
59
Unknown types
1

Dropped files

PID
Process
Filename
Type
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\SetupUI.cab
MD5:
SHA256:
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\XLBugHandler.dllexecutable
MD5:4B5830981EFBBB53D9730E2E861B6DB1
SHA256:675FAD5C20A11893874B28A88CC41C4E97A9F896B9020611A978D7E5CE96EF81
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\Microsoft.VC90.ATL.manifestxml
MD5:B41644A01C05740576B4E77662C7E86C
SHA256:A9A98FC7062262A47A1C0727339C760D18589B8549E4267762F7F4C88A103632
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\dl_peer_id.dllexecutable
MD5:F102E167834E286EF584CE97D684189B
SHA256:045ED5F3E949BBDEC103DA8DB0EFBD45C218152BDD4AB34143B45E3B49B8E918
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\msvcr90.dllexecutable
MD5:E7D91D008FE76423962B91C43C88E4EB
SHA256:ED0170D3DE86DA33E02BFA1605EEC8FF6010583481B1C530843867C1939D2185
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\atl71.dllexecutable
MD5:4EDD8D74EA48F58D3ECA7E9297F19221
SHA256:D422497FEBAA2FBB83A8A2EC342E08884C5A77FBDDABDE7BEC4E21884F56D0CE
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\libpng13.dllexecutable
MD5:66505356D16894ACA4A357F4169EC290
SHA256:32D3F911FD58972A0D359CA2809ACF9DC167F4C7153E8700D735F2B5CC2961C6
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\msvcp90.dllexecutable
MD5:6DE5C66E434A9C1729575763D891C6C2
SHA256:4F7ED27B532888CE72B96E52952073EAB2354160D1156924489054B7FA9B0B1A
6984XMPSetupKankan.exeC:\Users\admin\AppData\Local\Temp\XMPSetupKankan\5.2.18.5894\atl90.dllexecutable
MD5:338F1F7137860D3BF6094941AC2A9BA2
SHA256:5122E4A2E48E34326B6267D48BD007DA76A15243B90550EA565F1654CCC64877
6984XMPSetupKankan.exeC:\ProgramData\Thunder Network\DownloadLib\pub_store.dattext
MD5:F79C563BC47D7920DD680E84D5702346
SHA256:5AFC59CCD82D6312D396E1923A910C645785C497E3CD0BD8CD545FE8FEC2E182
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
21
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6012
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6984
XMPSetupKankan.exe
GET
39.104.21.243:80
http://conf.v.xunlei.com/setup/xmp5/startpageonline.lua
unknown
unknown
6984
XMPSetupKankan.exe
GET
200
39.104.21.243:80
http://conf.v.xunlei.com/setup/xmp5/onlineindex_config.lua
unknown
unknown
6984
XMPSetupKankan.exe
GET
200
39.104.21.243:80
http://conf.v.xunlei.com/setup/xmp5/onlineindex.lua
unknown
unknown
6984
XMPSetupKankan.exe
GET
39.104.21.243:80
http://conf.v.xunlei.com/setup/xmp5/shortcutonline.lua
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6012
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6984
XMPSetupKankan.exe
39.104.21.243:80
conf.v.xunlei.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
user.stat.v.xunlei.com
unknown
setup.stat.v.xunlei.com
unknown
conf.v.xunlei.com
  • 39.104.21.243
  • 121.41.70.248
unknown
02.rcv.sandai.net
whitelisted
zone.xmp.kankan.xunlei.com
unknown

Threats

No threats detected
No debug info