Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 16:20
Static task
static1
Behavioral task
behavioral1
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
Resource
win10v20201028
General
-
Target
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe
-
Size
270KB
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
-
SHA1
a9bf1c6f3f08203cf10fdaf141012dc83646aee1
-
SHA256
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
-
SHA512
ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
Malware Config
Extracted
C:\Users\Admin\Documents\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.cab/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.nu/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.link/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.tor2web.org/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion/8917-75D1-D0A8-0072-8D50
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/8917-75D1-D0A8-0072-8D50(Get
http://bqyjebfh25oellur.onion.cab/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.nu/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.link/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.tor2web.org/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion.to/8917-75D1-D0A8-0072-8D50);
http://bqyjebfh25oellur.onion.to/8917-75D1-D0A8-0072-8D50
http://bqyjebfh25oellur.onion/8917-75D1-D0A8-0072-8D50
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exeCloudStorageWizard.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" CloudStorageWizard.exe -
Executes dropped EXE 3 IoCs
Processes:
CloudStorageWizard.exeCloudStorageWizard.exeCloudStorageWizard.exepid process 776 CloudStorageWizard.exe 3872 CloudStorageWizard.exe 3984 CloudStorageWizard.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
CloudStorageWizard.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\WaitRestart.tiff CloudStorageWizard.exe File opened for modification C:\Users\Admin\Pictures\RequestRegister.tiff CloudStorageWizard.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CloudStorageWizard.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation CloudStorageWizard.exe -
Drops startup file 2 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exeCloudStorageWizard.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\CloudStorageWizard.lnk 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\CloudStorageWizard.lnk CloudStorageWizard.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
CloudStorageWizard.exe9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CloudStorageWizard = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" CloudStorageWizard.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CloudStorageWizard = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\CloudStorageWizard = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run CloudStorageWizard.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\CloudStorageWizard = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" CloudStorageWizard.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce CloudStorageWizard.exe -
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
CloudStorageWizard.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp589B.bmp" CloudStorageWizard.exe -
Drops file in Windows directory 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3148 taskkill.exe 4412 taskkill.exe -
Modifies Control Panel 5 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exeCloudStorageWizard.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop CloudStorageWizard.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\\CloudStorageWizard.exe\"" CloudStorageWizard.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Colors MicrosoftEdge.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 188 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 998267c856add601 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6d087bb302bad601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "zcb1u0u" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ba9247b902bad601 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListInPrivateBrowsingAllowed = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\DetectPhoneNumberComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Zoom MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{44FA2770-EE5C-47CE-A827-327474E0BCCC}" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\FontSize = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 405 IoCs
Processes:
CloudStorageWizard.exepid process 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe 776 CloudStorageWizard.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exepid process 1620 MicrosoftEdgeCP.exe 1620 MicrosoftEdgeCP.exe 1620 MicrosoftEdgeCP.exe 1620 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exeCloudStorageWizard.exetaskkill.exeCloudStorageWizard.exeCloudStorageWizard.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeAUDIODG.EXEtaskkill.exedescription pid process Token: SeDebugPrivilege 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe Token: SeDebugPrivilege 776 CloudStorageWizard.exe Token: SeDebugPrivilege 3148 taskkill.exe Token: SeDebugPrivilege 3872 CloudStorageWizard.exe Token: SeDebugPrivilege 3984 CloudStorageWizard.exe Token: SeDebugPrivilege 812 MicrosoftEdge.exe Token: SeDebugPrivilege 812 MicrosoftEdge.exe Token: SeDebugPrivilege 812 MicrosoftEdge.exe Token: SeDebugPrivilege 812 MicrosoftEdge.exe Token: SeDebugPrivilege 3692 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3692 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3692 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3692 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2636 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2636 MicrosoftEdgeCP.exe Token: 33 4288 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4288 AUDIODG.EXE Token: SeDebugPrivilege 4412 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 812 MicrosoftEdge.exe 1620 MicrosoftEdgeCP.exe 1620 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.execmd.exeCloudStorageWizard.exeMicrosoftEdgeCP.execmd.exedescription pid process target process PID 984 wrote to memory of 776 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe CloudStorageWizard.exe PID 984 wrote to memory of 776 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe CloudStorageWizard.exe PID 984 wrote to memory of 776 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe CloudStorageWizard.exe PID 984 wrote to memory of 3164 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 984 wrote to memory of 3164 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 984 wrote to memory of 3164 984 9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe cmd.exe PID 3164 wrote to memory of 3148 3164 cmd.exe taskkill.exe PID 3164 wrote to memory of 3148 3164 cmd.exe taskkill.exe PID 3164 wrote to memory of 3148 3164 cmd.exe taskkill.exe PID 3164 wrote to memory of 2288 3164 cmd.exe PING.EXE PID 3164 wrote to memory of 2288 3164 cmd.exe PING.EXE PID 3164 wrote to memory of 2288 3164 cmd.exe PING.EXE PID 776 wrote to memory of 504 776 CloudStorageWizard.exe NOTEPAD.EXE PID 776 wrote to memory of 504 776 CloudStorageWizard.exe NOTEPAD.EXE PID 776 wrote to memory of 1036 776 CloudStorageWizard.exe WScript.exe PID 776 wrote to memory of 1036 776 CloudStorageWizard.exe WScript.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 3692 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 776 wrote to memory of 4364 776 CloudStorageWizard.exe cmd.exe PID 776 wrote to memory of 4364 776 CloudStorageWizard.exe cmd.exe PID 4364 wrote to memory of 4412 4364 cmd.exe taskkill.exe PID 4364 wrote to memory of 4412 4364 cmd.exe taskkill.exe PID 4364 wrote to memory of 4508 4364 cmd.exe PING.EXE PID 4364 wrote to memory of 4508 4364 cmd.exe PING.EXE PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1620 wrote to memory of 2636 1620 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exe"C:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵PID:504
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵PID:1036
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "CloudStorageWizard.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\system32\taskkill.exetaskkill /t /f /im "CloudStorageWizard.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:4508 -
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe" > NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "9a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3148 -
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:2288
-
C:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exeC:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
C:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exeC:\Users\Admin\AppData\Roaming\{B41C886F-C036-B863-F7F7-D2EFEF05198C}\CloudStorageWizard.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:812
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:2276
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4201⤵
- Suspicious use of AdjustPrivilegeToken
PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a5c4246db34f6eb6b859b546740d77ce
SHA1604f24c9174924e9eaf619a6e994467ef58d88ef
SHA256b5585b6e0d3eb3e4b506736fbb82f2922f1f34594ded57dcf621e0f7407722f9
SHA512e7cf04bb6a4d2ae0d52e4b05e869ada8ebac7b1b301e13dc08d3c06e8cfdd0093db4a2effb522e80a04edf13fafd1efc002a669ea4c958ff502ba838ec0ac96a
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
e1f33c600d3cc76771aaa3bf940ff3fe
SHA1a9bf1c6f3f08203cf10fdaf141012dc83646aee1
SHA2569a6164b2628a14950961ff1031f5f2a77f3d5920c92174abd6802e66eb2229a9
SHA512ad96e7cd9e5c3fe7ba45c82d5183210b8dc58fc72faaad71e39e129f0356e7c6db5a72e2e52b3e4e7c30cf06872eb879d3577e76f7f3dba3ba7fa2eb62d7a08b
-
MD5
78bd8a08192a19a45611ca0a7725cf4f
SHA1bcca6ed23bc18d2ac832dd5cc1122f92b8c98916
SHA256cade0f0e4864e2c484a7ecf56273917c557645679916858881ee315166870c7c
SHA51270d255a677aec2dbe775353e48eed01a3fc63399b28f976bc28a5f49193f219b255db2f0b85cc73bc0e19d5c8c539c489d4190d27afd7ead59d8dc90ae0a5449
-
MD5
e8cf92b365391e3d96911176f4aeb520
SHA1440541a105c9c800f376dee6699c7e30a83c005f
SHA256e176f49aa06d6e5705c1e2b735680768d0cd53e98af52af010f51b50348e99b2
SHA512ce106950cdb743ce4a25b58da483b3a16acad97560e1e514e59be7d993fda762070c004bddedf52146ce9d917b41cda64348aa62d59db683a097a439a4b79fd9
-
MD5
1c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c