URL:

https://update.cyberlink.com/Retail/PowerDVD/DL/RY56VYUBXSS5H/CyberLink_PowerDVD_Downloader.exe

Full analysis: https://app.any.run/tasks/48c6eb6d-be6f-4f93-80bb-0fad4992f2e0
Verdict: Malicious activity
Analysis date: November 10, 2023, 20:35:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
SHA1:

E46B9F2227E573BDB61CB9A540AA6E0B227298A1

SHA256:

975AD0C88E79AEBBAA05A5F54128AF369B2E90A177031FB64831C3BD9E11DA87

SSDEEP:

3:N8vRAPHAYbK3ARTK3gQpSTRLmpAK4t2X0C:2vGAYNRTKtMTRLmiK4t/C

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Steals credentials from Web Browsers

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
  • SUSPICIOUS

    • Reads the Internet Settings

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Reads browser cookies

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Reads settings of System Certificates

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Reads security settings of Internet Explorer

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Checks Windows Trust Settings

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3428)
    • Checks supported languages

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
      • wmpnscfg.exe (PID: 3948)
    • Reads the computer name

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
      • wmpnscfg.exe (PID: 3948)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3428)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3196)
      • iexplore.exe (PID: 3428)
    • Checks proxy server information

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Creates files in the program directory

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Reads the machine GUID from the registry

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
      • wmpnscfg.exe (PID: 3948)
    • Create files in a temporary directory

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Process checks computer location settings

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Creates files or folders in the user directory

      • CyberLink_PowerDVD_Downloader.exe (PID: 3856)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe cyberlink_powerdvd_downloader.exe no specs cyberlink_powerdvd_downloader.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3196"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3428 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3428"C:\Program Files\Internet Explorer\iexplore.exe" "https://update.cyberlink.com/Retail/PowerDVD/DL/RY56VYUBXSS5H/CyberLink_PowerDVD_Downloader.exe"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3580"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CyberLink_PowerDVD_Downloader.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CyberLink_PowerDVD_Downloader.exeiexplore.exe
User:
admin
Company:
CyberLink
Integrity Level:
MEDIUM
Description:
CyberLink Downloader
Exit code:
3221226540
Version:
3.0.0.9118
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\cyberlink_powerdvd_downloader.exe
c:\windows\system32\ntdll.dll
3856"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CyberLink_PowerDVD_Downloader.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CyberLink_PowerDVD_Downloader.exe
iexplore.exe
User:
admin
Company:
CyberLink
Integrity Level:
HIGH
Description:
CyberLink Downloader
Exit code:
0
Version:
3.0.0.9118
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\cyberlink_powerdvd_downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wininet.dll
3948"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
Total events
15 369
Read events
15 274
Write events
92
Delete events
3

Modification events

(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000059010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3428) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
3
Suspicious files
16
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1binary
MD5:A06C93347E765BE77B49BCCA83365939
SHA256:B3DDAAB4EC046989AA486B2CE851F87209724EEFA9EFFF27184F2FD199690163
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
3196iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1binary
MD5:FF9D898C928E3FCF4B5A3AA1A8987B63
SHA256:73A7DA164ECF688194F51BF71B55E0D34773F68916BC3B6799A11353222CFF42
3856CyberLink_PowerDVD_Downloader.exeC:\Users\admin\AppData\Local\Temp\783da1a1-1f54-4a1f-b2e8-665cfee4c550.jsonbinary
MD5:99914B932BD37A50B983C5E7C90AE93B
SHA256:44136FA355B3678A1146AD16F7E8649E94FB4FC21FE77E8310C060F61CAAFF8A
3856CyberLink_PowerDVD_Downloader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9915FBCE5ECE56452A09FB65EDE2FAD2_8F7D75A9886FCC7456204A535FDA93D2binary
MD5:4174CE38B50D3EBEE0F280B288F9F42C
SHA256:0F836BBD0FEC5C5E304A85FCE05A2D112AAB5B4028862BF4F64C1949A6978D05
3856CyberLink_PowerDVD_Downloader.exeC:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\69cd3f33-77ef-48ad-856f-533a8f44d1ea.jsonbinary
MD5:96CCF74104CE5CFD6B6E47EABE9225A0
SHA256:FF046B9082C097CD51312C8A66F9EFC973AC89C6DBF2BAB49CB03B380D33DF27
3856CyberLink_PowerDVD_Downloader.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3428iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:732A49821C32C59FBE8E6ACA124ED59F
SHA256:38EA563E717032A81FAFA270F7CBEF739854BACC2C9931AC65B7976DECAC8484
3856CyberLink_PowerDVD_Downloader.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9915FBCE5ECE56452A09FB65EDE2FAD2_8F7D75A9886FCC7456204A535FDA93D2binary
MD5:BAB810D6B74CED2EE0080CA62DD0A7E9
SHA256:32E6EF95A413ECC3B2371112F14BAEE6AE6ED7592130F02C75AD2157316A1273
3856CyberLink_PowerDVD_Downloader.exeC:\Users\admin\AppData\Local\Temp\69cd3f33-77ef-48ad-856f-533a8f44d1ea.jsonbinary
MD5:99914B932BD37A50B983C5E7C90AE93B
SHA256:44136FA355B3678A1146AD16F7E8649E94FB4FC21FE77E8310C060F61CAAFF8A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
17
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3196
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJaiu8Zb34NbCEEshrmcCs%3D
unknown
binary
471 b
3196
iexplore.exe
GET
200
8.248.141.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e94bb274b63b057c
unknown
compressed
4.66 Kb
3856
CyberLink_PowerDVD_Downloader.exe
GET
200
192.229.221.95:80
http://status.thawte.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSFvn094QJ%2BcWGTwWWEy%2BBXPZkW8AQUo8heZVTlMHjBBeoHCmpZzLn%2B3loCEAnOrRNxqwzZwccRJ7GTMmg%3D
unknown
binary
471 b
3428
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
3196
iexplore.exe
GET
200
8.248.141.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?2747dc4fd30729d5
unknown
compressed
4.66 Kb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3196
iexplore.exe
8.248.141.254:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
4
System
192.168.100.255:137
unknown
3196
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
3856
CyberLink_PowerDVD_Downloader.exe
52.37.8.85:443
dna.cyberlink.com
AMAZON-02
US
unknown
3856
CyberLink_PowerDVD_Downloader.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
868
svchost.exe
95.101.148.135:80
Akamai International B.V.
NL
unknown
3856
CyberLink_PowerDVD_Downloader.exe
99.83.161.79:443
downloader.cyberlink.com
AMAZON-02
US
unknown
4
System
192.168.100.255:138
unknown
868
svchost.exe
23.52.121.156:80
armmf.adobe.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 8.248.141.254
  • 8.238.206.126
  • 8.248.147.254
  • 8.238.189.126
  • 8.248.137.254
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
dna.cyberlink.com
  • 52.37.8.85
  • 34.211.90.44
  • 44.239.42.151
unknown
status.thawte.com
  • 192.229.221.95
unknown
downloader.cyberlink.com
  • 99.83.161.79
  • 75.2.35.53
unknown
armmf.adobe.com
  • 23.52.121.156
unknown
iecvlist.microsoft.com
  • 152.199.19.161
unknown
r20swj13mr.microsoft.com
  • 152.199.19.161
unknown

Threats

No threats detected
No debug info