PUP.Baidu.A

Analysis Report

General information

Family Name: PUP.Baidu.A
Signature status: Root Not Trusted

Known Samples

MD5: a2b5ea80c664ecc90fdc51b167473831
SHA1: 59150fdf9d7e0db717d37c91123c26913a5f5195
SHA256: 4ED646E8479D320801E9CBBE6CCCDF95C4594DAB1583A4E2A0855FC1E3BE161F
File Size: 493.58 KB, 493576 bytes
MD5: ae15de52d9e73318019235bda5510785
SHA1: ed1fb1806685e8e46762262336db37ae41efa5b9
SHA256: CE8FA4AB181503378D34597031BE8D9F58E6B0909E6C873CE066FD9A1965FD63
File Size: 541.42 KB, 541424 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description
  • BaiduPlayer Setup
  • HiPlayer Setup
File Version
  • 1.19.0.108
  • 1.18.1.25
Legal Copyright
  • Copyright (c) Baidu Company
  • Copyright (c) Hi Company
Product Name
  • BaiduPlayer Setup
  • HiPlayer Setup
Product Version
  • 1.19.0.108
  • 1.18.1.25

Digital Signatures

Signer Root Status
Baidu (China) Co., Ltd. GlobalSign CodeSigning CA - G2 Root Not Trusted
Shenzhen Enode Technology Co., Ltd. VeriSign Class 3 Code Signing 2010 CA Root Not Trusted

File Traits

  • dll
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsabcbe.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsla72d.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsla817.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsla818.tmp\installoptions.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsla818.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsla818.tmp\iospecial.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsla818.tmp\modern-header.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsla818.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsla818.tmp\nsskinengine.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsla818.tmp\system.dll Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\nslbde8.tmp\installoptions.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbde8.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nslbde8.tmp\iospecial.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbde8.tmp\modern-header.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbde8.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbde8.tmp\nsskinengine.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nslbde8.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nswbdd8.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Ztmvhdnv\AppData\Local\Temp\~nsu.tmp\Au_.exe RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Ztmvhdnv\AppData\Local\Temp\~nsu.tmp\Au_.exe\??\C:\Users\Ztmvhdnv\AppData\Local\Temp\~nsu.tmp RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62*1\??\C:\P RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
Other Suspicious
  • AdjustTokenPrivileges

Shell Command Execution

"C:\Users\Ztmvhdnv\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
"C:\Users\Uubgfxgz\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Trending

Most Viewed

Loading...