download:

coccoc_en.exe

Full analysis: https://app.any.run/tasks/9676dce1-639d-4b89-8e01-aced9c11df88
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: December 21, 2019, 17:21:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B4A967D64BBF0BAC2130F62C2009A593

SHA1:

7B2BF9BE60A087E5EA2D4F2CCEF4AAE3A658EB94

SHA256:

95F2654DD6117482DDC0C102B7756A02176BF030980DD3388E12D8EE7AABAC72

SSDEEP:

24576:bUxt5QIfw6DEr9DNm7Bpk122zj+j4pAlhm7FQI8g1gRgpwNbr2X+:bgt5QIYKEjmt3Kj4g1agpwNHg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • CocCocUpdate.exe (PID: 2104)
    • Application was dropped or rewritten from another process

      • CocCocUpdate.exe (PID: 2104)
      • CocCocUpdate.exe (PID: 2196)
      • CocCocUpdate.exe (PID: 4020)
      • CocCocUpdate.exe (PID: 2056)
      • setup.exe (PID: 3972)
      • setup.exe (PID: 1792)
      • setup.exe (PID: 3404)
      • setup.exe (PID: 2844)
      • CocCocCrashHandler.exe (PID: 616)
      • browser.exe (PID: 1560)
      • browser.exe (PID: 4092)
      • CocCocUpdate.exe (PID: 520)
      • browser.exe (PID: 2340)
      • browser.exe (PID: 2136)
      • browser.exe (PID: 3116)
      • browser.exe (PID: 2596)
      • browser.exe (PID: 408)
      • browser.exe (PID: 3440)
      • browser.exe (PID: 940)
      • browser.exe (PID: 2896)
      • browser.exe (PID: 3104)
      • browser.exe (PID: 332)
      • browser.exe (PID: 3508)
      • browser.exe (PID: 2148)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 3788)
      • browser.exe (PID: 1524)
      • browser.exe (PID: 2120)
      • browser.exe (PID: 2708)
      • browser.exe (PID: 3600)
      • browser.exe (PID: 3280)
      • browser.exe (PID: 3300)
      • browser.exe (PID: 3152)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 2564)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 2720)
      • browser.exe (PID: 1884)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 2560)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 4084)
      • browser.exe (PID: 3016)
      • browser.exe (PID: 3700)
      • browser.exe (PID: 2700)
      • browser.exe (PID: 3888)
      • browser.exe (PID: 2868)
      • browser.exe (PID: 3728)
      • browser.exe (PID: 2096)
      • browser.exe (PID: 4088)
      • browser.exe (PID: 2840)
      • browser.exe (PID: 2924)
      • browser.exe (PID: 3088)
      • browser.exe (PID: 3568)
      • browser.exe (PID: 688)
      • browser.exe (PID: 1912)
      • browser.exe (PID: 1732)
      • browser.exe (PID: 2696)
      • browser.exe (PID: 1756)
      • browser.exe (PID: 788)
      • browser.exe (PID: 3964)
      • browser.exe (PID: 976)
      • browser.exe (PID: 3376)
      • browser.exe (PID: 3064)
      • browser.exe (PID: 1940)
      • browser.exe (PID: 4032)
      • browser.exe (PID: 1160)
      • browser.exe (PID: 1772)
    • Loads dropped or rewritten executable

      • CocCocUpdate.exe (PID: 2104)
      • CocCocUpdate.exe (PID: 2196)
      • CocCocUpdate.exe (PID: 4020)
      • CocCocUpdate.exe (PID: 2056)
      • browser.exe (PID: 4092)
      • browser.exe (PID: 1560)
      • CocCocUpdate.exe (PID: 520)
      • browser.exe (PID: 2340)
      • browser.exe (PID: 2136)
      • browser.exe (PID: 3116)
      • browser.exe (PID: 2596)
      • browser.exe (PID: 2896)
      • browser.exe (PID: 408)
      • browser.exe (PID: 940)
      • browser.exe (PID: 3440)
      • browser.exe (PID: 3600)
      • browser.exe (PID: 332)
      • browser.exe (PID: 3508)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 2148)
      • browser.exe (PID: 1524)
      • browser.exe (PID: 3788)
      • browser.exe (PID: 2708)
      • browser.exe (PID: 3104)
      • browser.exe (PID: 3280)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 3300)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 2564)
      • browser.exe (PID: 3152)
      • browser.exe (PID: 2720)
      • browser.exe (PID: 2120)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 1884)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 2560)
      • browser.exe (PID: 3888)
      • browser.exe (PID: 2700)
      • browser.exe (PID: 4084)
      • browser.exe (PID: 2840)
      • browser.exe (PID: 3700)
      • browser.exe (PID: 3016)
      • browser.exe (PID: 2868)
      • browser.exe (PID: 3728)
      • browser.exe (PID: 2096)
      • browser.exe (PID: 4088)
      • browser.exe (PID: 788)
      • browser.exe (PID: 2924)
      • browser.exe (PID: 3088)
      • browser.exe (PID: 3568)
      • browser.exe (PID: 2696)
      • browser.exe (PID: 688)
      • browser.exe (PID: 1912)
      • browser.exe (PID: 1732)
      • browser.exe (PID: 1772)
      • browser.exe (PID: 3964)
      • browser.exe (PID: 976)
      • browser.exe (PID: 3376)
      • browser.exe (PID: 1940)
      • browser.exe (PID: 4032)
      • browser.exe (PID: 1756)
      • browser.exe (PID: 1160)
      • browser.exe (PID: 3064)
    • Loads the Task Scheduler DLL interface

      • CocCocUpdate.exe (PID: 2104)
    • Loads the Task Scheduler COM API

      • CocCocUpdate.exe (PID: 2104)
    • Changes settings of System certificates

      • browser.exe (PID: 2136)
  • SUSPICIOUS

    • Starts itself from another location

      • CocCocUpdate.exe (PID: 2104)
      • setup.exe (PID: 3972)
    • Creates files in the Windows directory

      • CocCocUpdate.exe (PID: 2104)
    • Executable content was dropped or overwritten

      • CocCocUpdate.exe (PID: 2104)
      • coccoc_en.exe (PID: 1404)
      • 77.0.3865.144_coccocsetup.exe (PID: 2328)
      • setup.exe (PID: 3972)
    • Creates files in the user directory

      • CocCocUpdate.exe (PID: 2104)
      • setup.exe (PID: 3972)
      • browser.exe (PID: 1560)
    • Creates COM task schedule object

      • CocCocUpdate.exe (PID: 2196)
    • Creates a software uninstall entry

      • setup.exe (PID: 3972)
    • Application launched itself

      • setup.exe (PID: 3404)
      • browser.exe (PID: 1560)
      • CocCocUpdate.exe (PID: 2056)
    • Modifies the open verb of a shell class

      • setup.exe (PID: 3404)
  • INFO

    • Reads the hosts file

      • browser.exe (PID: 1560)
      • browser.exe (PID: 2136)
    • Reads settings of System Certificates

      • browser.exe (PID: 2136)
    • Dropped object may contain Bitcoin addresses

      • browser.exe (PID: 1560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:19 12:42:10+02:00
PEType: PE32
LinkerVersion: 14
CodeSize: 91648
InitializedDataSize: 1103872
UninitializedDataSize: -
EntryPoint: 0x5819
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.5.15.105
ProductVersionNumber: 2.5.15.105
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Coc Coc Co., Ltd.
FileDescription: CocCoc Update Setup
FileVersion: 2.5.15.105
InternalName: CocCoc Update Setup
LegalCopyright: Copyright 2012 Google Inc.
OriginalFileName: CocCocUpdateSetup.exe
ProductName: CocCoc Update
ProductVersion: 2.5.15.105
LanguageId: en

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 19-Jul-2019 10:42:10
Detected languages:
  • English - United States
  • Vietnamese - Viet Nam
Debug artifacts:
  • mi_exe_stub.pdb
CompanyName: Coc Coc Co., Ltd.
FileDescription: CocCoc Update Setup
FileVersion: 2.5.15.105
InternalName: CocCoc Update Setup
LegalCopyright: Copyright 2012 Google Inc.
OriginalFilename: CocCocUpdateSetup.exe
ProductName: CocCoc Update
ProductVersion: 2.5.15.105
LanguageId: en

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000110

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 6
Time date stamp: 19-Jul-2019 10:42:10
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00016521
0x00016600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.64637
.rdata
0x00018000
0x00006ECA
0x00007000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.24475
.data
0x0001F000
0x00001424
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
2.37747
.gfids
0x00021000
0x0000010C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.40885
.rsrc
0x00022000
0x00104910
0x00104A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.99693
.reloc
0x00127000
0x00001180
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.52843

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.16024
919
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
4.13669
1384
Latin 1 / Western European
English - United States
RT_ICON
3
3.91985
744
Latin 1 / Western European
English - United States
RT_ICON
4
4.83772
2216
Latin 1 / Western European
English - United States
RT_ICON
5
3.68656
1640
Latin 1 / Western European
English - United States
RT_ICON
6
4.50268
3752
Latin 1 / Western European
English - United States
RT_ICON
101
2.86669
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
102
7.9998
1053544
Latin 1 / Western European
UNKNOWN
B
1321
3.6945
610
Latin 1 / Western European
Vietnamese - Viet Nam
RT_STRING

Imports

KERNEL32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
112
Monitored processes
70
Malicious processes
22
Suspicious processes
30

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start coccoc_en.exe coccocupdate.exe coccocupdate.exe no specs coccocupdate.exe coccocupdate.exe 77.0.3865.144_coccocsetup.exe setup.exe setup.exe no specs setup.exe setup.exe no specs coccoccrashhandler.exe no specs browser.exe browser.exe no specs coccocupdate.exe browser.exe no specs browser.exe browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs browser.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
332"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=utility --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --service-sandbox-type=utility --service-request-channel-token=1162271139854331644 --mojo-platform-channel-handle=2768 --ignored=" --type=renderer " /prefetch:8C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
408"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=renderer --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=18186952356906021618 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2124 /prefetch:1C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
520"C:\Users\admin\AppData\Local\CocCoc\Update\CocCocUpdate.exe" /ping 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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjM0MDciIGRvd25sb2FkX3RpbWVfbXM9IjYwMzkxIiBkb3dubG9hZGVkPSI5NTQ0NTcyOCIgdG90YWw9Ijk1NDQ1NzI4IiBpbnN0YWxsX3RpbWVfbXM9IjEzNDIyIi8-PC9hcHA-PC9yZXF1ZXN0PgC:\Users\admin\AppData\Local\CocCoc\Update\CocCocUpdate.exe
CocCocUpdate.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
MEDIUM
Description:
CocCoc Update
Exit code:
0
Version:
2.5.15.105
Modules
Images
c:\users\admin\appdata\local\coccoc\update\coccocupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
616"C:\Users\admin\AppData\Local\CocCoc\Update\2.5.15.105\CocCocCrashHandler.exe"C:\Users\admin\AppData\Local\CocCoc\Update\2.5.15.105\CocCocCrashHandler.exeCocCocUpdate.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
MEDIUM
Description:
CocCoc Crash Handler
Exit code:
0
Version:
2.5.15.105
Modules
Images
c:\users\admin\appdata\local\coccoc\update\2.5.15.105\coccoccrashhandler.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
688"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=utility --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --service-sandbox-type=utility --service-request-channel-token=3187462889071011326 --mojo-platform-channel-handle=3388 --ignored=" --type=renderer " /prefetch:8C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
788"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=utility --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --service-sandbox-type=utility --service-request-channel-token=8000557229150957354 --mojo-platform-channel-handle=3316 --ignored=" --type=renderer " /prefetch:8C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
940"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=renderer --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16769020636763902575 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2316 /prefetch:1C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
976"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=renderer --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=3014699584324413756 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:1C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1160"C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exe" --type=utility --field-trial-handle=912,10617038965913837104,17177854203352854167,131072 --lang=en-US --service-sandbox-type=utility --service-request-channel-token=8240018561252393566 --mojo-platform-channel-handle=3264 --ignored=" --type=renderer " /prefetch:8C:\Users\admin\AppData\Local\CocCoc\Browser\Application\browser.exebrowser.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
LOW
Description:
CocCoc
Exit code:
0
Version:
77.0.3865.144
Modules
Images
c:\users\admin\appdata\local\coccoc\browser\application\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\coccoc\browser\application\77.0.3865.144\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1404"C:\Users\admin\Desktop\coccoc_en.exe" C:\Users\admin\Desktop\coccoc_en.exe
explorer.exe
User:
admin
Company:
Coc Coc Co., Ltd.
Integrity Level:
MEDIUM
Description:
CocCoc Update Setup
Exit code:
0
Version:
2.5.15.105
Modules
Images
c:\users\admin\desktop\coccoc_en.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
4 942
Read events
2 196
Write events
2 731
Delete events
15

Modification events

(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update
Operation:writeName:path
Value:
C:\Users\admin\AppData\Local\CocCoc\Update\CocCocUpdate.exe
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update
Operation:writeName:TorrentPath
Value:
C:\Users\admin\AppData\Local\CocCoc\Update\CocCocTorrentUpdate.exe
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update
Operation:writeName:UninstallCmdLine
Value:
"C:\Users\admin\AppData\Local\CocCoc\Update\CocCocUpdate.exe" /uninstall
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:pv
Value:
2.5.15.105
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update\Clients\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:name
Value:
Cốc Cốc Update
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}
Operation:writeName:pv
Value:
2.5.15.105
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:CocCoc Update
Value:
"C:\Users\admin\AppData\Local\CocCoc\Update\CocCocUpdate.exe" /c
(PID) Process:(2104) CocCocUpdate.exeKey:HKEY_CURRENT_USER\Software\CocCoc\Update
Operation:writeName:IsMSIHelperRegistered
Value:
0
(PID) Process:(2196) CocCocUpdate.exeKey:HKEY_CLASSES_ROOT\CLSID\{0A039001-050F-4ADA-AD8B-F2E5C9615B45}\InprocServer32
Operation:writeName:
Value:
C:\Users\admin\AppData\Local\CocCoc\Update\2.5.15.105\psuser.dll
(PID) Process:(2196) CocCocUpdate.exeKey:HKEY_CLASSES_ROOT\CLSID\{0A039001-050F-4ADA-AD8B-F2E5C9615B45}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Both
Executable files
38
Suspicious files
86
Text files
750
Unknown types
36

Dropped files

PID
Process
Filename
Type
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\CocCocUpdateBroker.exeexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\coccocpdate.dllexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\CocCocUpdateHelper.msiexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\psmachine.dllexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\CocCocUpdateWebPlugin.exeexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\psuser.dllexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\coccocpdateres_vi.dllexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\coccocpdateres_en.dllexecutable
MD5:
SHA256:
1404coccoc_en.exeC:\Users\admin\AppData\Local\Temp\GUM9891.tmp\CocCocUpdateSetup.exeexecutable
MD5:
SHA256:
2104CocCocUpdate.exeC:\Users\admin\AppData\Roaming\CocCoc\uidtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
2
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4020
CocCocUpdate.exe
POST
200
123.30.175.98:80
http://browser.coccoc.com/service/update2
VN
xml
235 b
malicious
2056
CocCocUpdate.exe
POST
200
123.30.175.98:80
http://browser.coccoc.com/service/update2?cup2key=5:3128470769&cup2hreq=8f7e5e47bb2a61b6d526268a458eb582aac8a8ce688469d4d0fa0097d12abc82
VN
xml
937 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4020
CocCocUpdate.exe
123.30.175.98:80
browser.coccoc.com
VNPT Corp
VN
unknown
2056
CocCocUpdate.exe
123.30.175.98:80
browser.coccoc.com
VNPT Corp
VN
unknown
123.30.175.23:443
download.coccoc.com
VNPT Corp
VN
suspicious

DNS requests

Domain
IP
Reputation
browser.coccoc.com
  • 123.30.175.98
malicious
download.coccoc.com
  • 123.30.175.23
  • 123.30.175.16
suspicious

Threats

PID
Process
Class
Message
2136
browser.exe
Unknown Traffic
ET INFO Suspicious User-Agent (1 space)
2136
browser.exe
Unknown Traffic
ET INFO Suspicious User-Agent (1 space)
Potential Corporate Privacy Violation
ET P2P BitTorrent DHT ping request
2136
browser.exe
Misc activity
ADWARE [PTsecurity] AdLoad (PUA:Win32/Catalina)
2 ETPRO signatures available at the full report
No debug info