| URL: | http://upgrade.down.sandai.net/thunderx/XunLeiSetup10.1.28.676up.exe |
| Full analysis: | https://app.any.run/tasks/b714bceb-64d6-415e-a9d0-805dbd7ac03c |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 07, 2020, 16:02:28 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | F1E5BA79CEDD9AE7B6C8A34936D1AE99 |
| SHA1: | CF2172F5CA99617177237E9F1B7E2573BE8ADD90 |
| SHA256: | FB0508D9F520728903D3C6B8EF8E446489E90F1B0B5A9E2F5F9454BF1BBA7EF7 |
| SSDEEP: | 3:N1KLKPKSbjLBNeomQOuUdTsA:COyyjOom3bRsA |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 272 | C:\Windows\system32\netsh.exe advfirewall firewall delete rule name="Thunder" dir=in action=allow program="C:\Program Files\Thunder Network\Thunder\Program\Thunder.exe" | C:\Windows\system32\netsh.exe | — | XunLeiSetup10.1.28.676up.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 332 | C:\Windows\system32\netsh.exe advfirewall firewall add rule name="DownloadSDKServer" dir=in action=allow program="C:\Users\admin\AppData\Local\Temp\ThunderInstall\10.1.28.676\SDK\DownloadSDKServer.exe" | C:\Windows\system32\netsh.exe | — | XunLeiSetup10.1.28.676up.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 716 | regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\ThunderMyComputerIcon.dll" | C:\Windows\system32\regsvr32.exe | XunLeiSetup10.1.28.676up.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 992 | regsvr32 /S "C:\Program Files\Thunder Network\Thunder\Thunder BHO Platform\np_tdieplat.dll" | C:\Windows\system32\regsvr32.exe | ThunderBHOPlatform.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1032 | "C:\Program Files\Thunder Network\Thunder\BHO\BHOInstall.exe" -checkandstat | C:\Program Files\Thunder Network\Thunder\BHO\BHOInstall.exe | XunLeiSetup10.1.28.676up.exe | ||||||||||||
User: admin Company: ShenZhen Xunlei Networking Technologies,LTD Integrity Level: HIGH Description: BHOInstall Exit code: 1 Version: 1, 0, 0, 37 Modules
| |||||||||||||||
| 1188 | "C:\Program Files\Thunder Network\Thunder\Program\XLServicePlatform.exe" -p | C:\Program Files\Thunder Network\Thunder\Program\XLServicePlatform.exe | — | XunLeiSetup10.1.28.676up.exe | |||||||||||
User: admin Company: ShenZhen Xunlei Networking Technologies,LTD Integrity Level: HIGH Description: XLServicePlatform Exit code: 0 Version: 2, 0, 0, 5 Modules
| |||||||||||||||
| 1412 | C:\Windows\system32\netsh.exe advfirewall firewall add rule name="DownloadSDKServer" dir=in action=allow program="C:\Program Files\Thunder Network\Thunder\Program\XMP\SDK\DownloadSDKServer.exe" | C:\Windows\system32\netsh.exe | — | XunLeiSetup10.1.28.676up.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1468 | "C:\Program Files\Thunder Network\Thunder\Program\InstallXLGuard.exe" -u | C:\Program Files\Thunder Network\Thunder\Program\InstallXLGuard.exe | XLWFPSetup.exe | ||||||||||||
User: admin Company: 深圳市迅雷网络技术有限公司 Integrity Level: HIGH Description: XLGUARD驱动安装程序 Exit code: 0 Version: 1, 0, 0, 3 Modules
| |||||||||||||||
| 1524 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=6612920715048522187 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
| 1544 | regsvr32 /s "C:\Program Files\Thunder Network\Thunder\BHO\XunLeiBHO64.dll" | C:\Windows\system32\regsvr32.exe | — | XunLeiSetup10.1.28.676up.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft(C) Register Server Exit code: 3 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | failed_count |
Value: 0 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 2 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
| Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
| Operation: | write | Name: | state |
Value: 1 | |||
| (PID) Process: | (2176) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | write | Name: | 2300-13222886563758250 |
Value: 259 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
| Operation: | write | Name: | dr |
Value: 1 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
| Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
| Operation: | delete value | Name: | 1512-13197841398593750 |
Value: 0 | |||
| (PID) Process: | (2300) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
| Operation: | write | Name: | usagestats |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\5038891e-96d1-4fec-9c19-ebc98a487711.tmp | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a86f.TMP | text | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1 | — | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | text | |
MD5:— | SHA256:— | |||
| 2300 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2404 | DownloadSDKServer.exe | GET | — | 140.249.61.134:80 | http://xmp.down.sandai.net/xmp/APlayerCodecs3Embed.exe | CN | — | — | malicious |
2404 | DownloadSDKServer.exe | GET | — | 140.249.61.134:80 | http://xmp.down.sandai.net/xmp/APlayerCodecs3Embed.exe | CN | — | — | malicious |
1796 | chrome.exe | GET | 200 | 140.249.61.100:80 | http://upgrade.down.sandai.net/thunderx/XunLeiSetup10.1.28.676up.exe | CN | executable | 87.3 Mb | malicious |
2404 | DownloadSDKServer.exe | POST | 200 | 120.79.103.155:80 | http://dlcfg.client.v6.chub.sandai.net/query | CN | binary | 864 b | unknown |
2404 | DownloadSDKServer.exe | POST | 200 | 140.206.225.244:80 | http://hub5idx.v6.shub.sandai.net:80/ | CN | binary | 1.74 Kb | malicious |
2404 | DownloadSDKServer.exe | POST | — | 106.14.169.88:80 | http://hubciddata.sandai.net:80/ | CN | — | — | malicious |
2404 | DownloadSDKServer.exe | POST | 200 | 47.102.253.179:80 | http://dconf.xcloud.sandai.net/api/xsdn | CN | text | 343 b | unknown |
2404 | DownloadSDKServer.exe | POST | 200 | 47.92.75.239:80 | http://hub5p.sandai.net:80/ | CN | binary | 52 b | malicious |
2404 | DownloadSDKServer.exe | POST | 200 | 47.92.171.207:80 | http://hub5pr.sandai.net:80/ | CN | binary | 148 b | malicious |
3392 | XunLeiSetup10.1.28.676up.exe | GET | 200 | 140.206.225.241:8099 | http://stat.download.xunlei.com:8099/?xlbtid=1&aid=1022&id=201&peerid=5254004A04AF038Q&userid=&referfrom=100017&OS=win&OSversion=6.1.7601&productname=XunLeiSetup10.1.28.676up.exe&productversion=10.1.28.676 | CN | image | 43 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1796 | chrome.exe | 140.249.61.100:80 | upgrade.down.sandai.net | No.31,Jin-rong Street | CN | suspicious |
1796 | chrome.exe | 216.58.207.77:443 | accounts.google.com | Google Inc. | US | whitelisted |
1796 | chrome.exe | 172.217.16.164:443 | www.google.com | Google Inc. | US | whitelisted |
1796 | chrome.exe | 172.217.21.227:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
1796 | chrome.exe | 172.217.18.163:443 | ssl.gstatic.com | Google Inc. | US | whitelisted |
1796 | chrome.exe | 172.217.21.195:443 | www.gstatic.com | Google Inc. | US | whitelisted |
1796 | chrome.exe | 172.217.22.14:443 | clients1.google.com | Google Inc. | US | whitelisted |
3392 | XunLeiSetup10.1.28.676up.exe | 140.206.225.241:8099 | stat.download.xunlei.com | China Unicom Shanghai network | CN | suspicious |
3392 | XunLeiSetup10.1.28.676up.exe | 47.246.43.226:80 | static-xl.a.88cdn.com | — | US | malicious |
2404 | DownloadSDKServer.exe | 47.102.253.179:80 | dconf.xcloud.sandai.net | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
clientservices.googleapis.com |
| whitelisted |
upgrade.down.sandai.net |
| malicious |
accounts.google.com |
| shared |
www.google.com |
| malicious |
ssl.gstatic.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
stat.download.xunlei.com |
| malicious |
clients1.google.com |
| whitelisted |
static-xl.a.88cdn.com |
| malicious |
dconf.xcloud.sandai.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1796 | chrome.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2404 | DownloadSDKServer.exe | Potential Corporate Privacy Violation | ET P2P BitTorrent DHT ping request |
1032 | BHOInstall.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (HTTP Downloader) |
1032 | BHOInstall.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (HTTP Downloader) |
1940 | svchost.exe | Misc activity | ET INFO Packed Executable Download |
1940 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1940 | svchost.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
Process | Message |
|---|---|
XunLeiSetup10.1.28.676up.exe | .. |
XunLeiSetup10.1.28.676up.exe | .. |
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:108 Xunlei::Platform::OSShell::InstallRuntime] GetPlatformDataPath : C:\Users\admin\AppData\LocalLow\Thunder Network\Thunder BHO Platform
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:109 Xunlei::Platform::OSShell::InstallRuntime] GetPlatformPackagePath : C:\Users\admin\AppData\LocalLow\Thunder Network\Thunder BHO Platform\package
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:106 Xunlei::Platform::OSShell::InstallRuntime] GetModulePath : C:\Program Files\Thunder Network\Thunder\Thunder BHO Platform\np_tdieplat.dll
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
|
regsvr32.exe | [992:2748] [16:05 22] Message <np_tdieplat.dll> [osshell.cpp:39 Xunlei::Platform::OSShell::InstallRuntime] Initializing running environment ...
|
regsvr32.exe | [992:2748] [16:05 22] Debug <np_tdieplat.dll> [osshell.cpp:270 Xunlei::Platform::OSShell::GetAppDatalowPath] using SHGetKnownFolderPath with FOLDERID_LocalAppDataLow
|