Analysis
-
max time kernel
300s -
max time network
304s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
09/11/2021, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
ebook.exe.org.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
ebook.exe.org.exe
Resource
win10-en-20211104
General
-
Target
ebook.exe.org.exe
-
Size
28.2MB
-
MD5
07f79b595254bd60ccec7561e858de35
-
SHA1
6199b33c52351cdc5d6cd1b61bb9f3602c9eb799
-
SHA256
dbd9cfa3d9b4e482ee79e7726e95168a5e27bb0482a0e4744a1e1c56d75f1c32
-
SHA512
6ca0a66adebe69b10e2c79f75441f264e8481d481731ba3bde0ee522f64761558fc74739a1a43b411708d0c6169a92167febd490a0cd96693236de29fc37362b
Malware Config
Signatures
-
GoldDragon
GoldDragon is a second-stage backdoor attributed to Kimsuky.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1416 ebook.exe.org.tmp 1424 ebookreader.exe 1008 ebook_reader_setup.exe 1012 ebook_reader_setup.tmp 480 ebookreader.exe -
Loads dropped DLL 64 IoCs
pid Process 1420 ebook.exe.org.exe 1416 ebook.exe.org.tmp 1416 ebook.exe.org.tmp 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1008 ebook_reader_setup.exe 1012 ebook_reader_setup.tmp 1012 ebook_reader_setup.tmp 1012 ebook_reader_setup.tmp 1012 ebook_reader_setup.tmp 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Qml.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-89EK6.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\imageformats\qwbmp.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Sensors.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\D3Dcompiler_47.dll ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-EA2D9.tmp ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5WebKit.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-BSVDJ.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\imageformats\qdds.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Network.dll ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-J3NE5.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-2GPDC.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-72AKG.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\imageformats\is-47FMV.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-BOV8S.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-0MOKN.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-DST14.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-U7P0V.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-B45C3.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-QDPUQ.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-I7JV2.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-TNUV3.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-VS3S8.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-1H0HN.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-A2VLE.tmp ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5MultimediaWidgets.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-C412P.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-4P4LG.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5SerialPort.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-U0NP7.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\imageformats\qtiff.dll ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-SKT08.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-S1O9A.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\imageformats\is-9OGGF.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-JV41T.tmp ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\imageformats\qicns.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\quazip.dll ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Network.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-O5K1J.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-EORJP.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-DT8SE.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Gui.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\ebookreader.exe ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-356VN.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\imageformats\is-G5BFL.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-DK3G3.tmp ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\sqldrivers\qsqlite.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5PrintSupport.dll ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\vcomp100.dll ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5OpenGL.dll ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-NPTTR.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-KVUGQ.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-KFK48.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\unins000.msg ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-2GDQK.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-QR0PM.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-9DD9Q.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\imageformats\is-CS18D.tmp ebook.exe.org.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-KCEPK.tmp ebook.exe.org.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\imageformats\qdds.dll ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\Qt5Widgets.dll ebook_reader_setup.tmp File opened for modification C:\Program Files (x86)\Icecream Ebook Reader\sqldrivers\qsqlite.dll ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\is-ENEJU.tmp ebook_reader_setup.tmp File created C:\Program Files (x86)\Icecream Ebook Reader\translations\is-H5FDD.tmp ebook_reader_setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 4056a3e65fd5d701 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003d000000900300001d020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DOMStorage\icecreamapps.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{02F025D1-4153-11EC-A1A5-C2A3A902DBDF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DOMStorage\icecreamapps.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09b99dd5fd5d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C805E21-4153-11EC-A1A5-C2A3A902DBDF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005bf5749d3a275447873d564a46cb19360000000002000000000010660000000100002000000092d3c6ac048796ba6d3fc322ade9e9269555c0d6d578675b45ad6f38635c8114000000000e80000000020000200000007fdfa884c667a0d704aa8894b31178fa95e4e27a44c5dd71d6acbf0f2487bac020000000c242438f17cbd53098f0ebc4707eaa3368e16421f55779da88ec3d1e6e7ee815400000009ee09f8ba0a24e095b5d5dbc96d19475d45040ce0e25afa6dfb36747e459e391fc1bc8d052c3064c5cf42fda45784f743edf78ea2c899d307b45e080aef94ba0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cbz ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\DefaultIcon ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\epub.ico" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\shell\open\command ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fb2 ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\DefaultIcon ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\DefaultIcon ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell\open\command ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.epub ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mobi ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mobi\ = "IcecreamEbookReader\\MOBI" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cbz\ = "IcecreamEbookReader\\CBZ" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cbr\ = "IcecreamEbookReader\\CBR" ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\cbr.ico" ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\epub.ico" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.epub\ = "IcecreamEbookReader\\EPUB" ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fb2\ = "IcecreamEbookReader\\FB2" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\DefaultIcon ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\shell ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mobi\ = "IcecreamEbookReader\\MOBI" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fb2 ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\cbz.ico" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cbr\ = "IcecreamEbookReader\\CBR" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\shell\open\command ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\DefaultIcon ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\shell\open\command ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\cbz.ico" ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.epub\ = "IcecreamEbookReader\\EPUB" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\shell ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell\open\command ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\DefaultIcon ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\mobi.ico" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\DefaultIcon ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cbr ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\shell\open ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\shell\open\command ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\fb2.ico" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cbz ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\shell\open ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\DefaultIcon ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\shell\open ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBR\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\cbr.ico" ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\shell\open\command ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\EPUB\shell ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\mobi.ico" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\shell\open ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cbz\ = "IcecreamEbookReader\\CBZ" ebook_reader_setup.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2 ebook.exe.org.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\FB2\DefaultIcon\ = "C:\\Program Files (x86)\\Icecream Ebook Reader\\fb2.ico" ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\CBZ\shell\open\command ebook.exe.org.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\DefaultIcon ebook_reader_setup.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IcecreamEbookReader\MOBI\shell\open\command\ = "\"C:\\Program Files (x86)\\Icecream Ebook Reader\\ebookreader.exe\" \"%1\"" ebook_reader_setup.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1424 ebookreader.exe 480 ebookreader.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1416 ebook.exe.org.tmp 1416 ebook.exe.org.tmp 1012 ebook_reader_setup.tmp 1012 ebook_reader_setup.tmp -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1424 ebookreader.exe 480 ebookreader.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1416 ebook.exe.org.tmp 964 iexplore.exe 1488 iexplore.exe 1488 iexplore.exe 1012 ebook_reader_setup.tmp 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1424 ebookreader.exe 1424 ebookreader.exe 1424 ebookreader.exe 1488 iexplore.exe 1488 iexplore.exe 796 IEXPLORE.EXE 796 IEXPLORE.EXE 1488 iexplore.exe 1488 iexplore.exe 796 IEXPLORE.EXE 796 IEXPLORE.EXE 480 ebookreader.exe 480 ebookreader.exe 480 ebookreader.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1420 wrote to memory of 1416 1420 ebook.exe.org.exe 28 PID 1416 wrote to memory of 964 1416 ebook.exe.org.tmp 30 PID 1416 wrote to memory of 964 1416 ebook.exe.org.tmp 30 PID 1416 wrote to memory of 964 1416 ebook.exe.org.tmp 30 PID 1416 wrote to memory of 964 1416 ebook.exe.org.tmp 30 PID 964 wrote to memory of 1868 964 iexplore.exe 32 PID 964 wrote to memory of 1868 964 iexplore.exe 32 PID 964 wrote to memory of 1868 964 iexplore.exe 32 PID 964 wrote to memory of 1868 964 iexplore.exe 32 PID 1416 wrote to memory of 1424 1416 ebook.exe.org.tmp 34 PID 1416 wrote to memory of 1424 1416 ebook.exe.org.tmp 34 PID 1416 wrote to memory of 1424 1416 ebook.exe.org.tmp 34 PID 1416 wrote to memory of 1424 1416 ebook.exe.org.tmp 34 PID 1424 wrote to memory of 1488 1424 ebookreader.exe 35 PID 1424 wrote to memory of 1488 1424 ebookreader.exe 35 PID 1424 wrote to memory of 1488 1424 ebookreader.exe 35 PID 1424 wrote to memory of 1488 1424 ebookreader.exe 35 PID 1488 wrote to memory of 796 1488 iexplore.exe 36 PID 1488 wrote to memory of 796 1488 iexplore.exe 36 PID 1488 wrote to memory of 796 1488 iexplore.exe 36 PID 1488 wrote to memory of 796 1488 iexplore.exe 36 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1488 wrote to memory of 1008 1488 iexplore.exe 38 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1008 wrote to memory of 1012 1008 ebook_reader_setup.exe 39 PID 1012 wrote to memory of 1700 1012 ebook_reader_setup.tmp 41 PID 1012 wrote to memory of 1700 1012 ebook_reader_setup.tmp 41 PID 1012 wrote to memory of 1700 1012 ebook_reader_setup.tmp 41 PID 1012 wrote to memory of 1700 1012 ebook_reader_setup.tmp 41 PID 1012 wrote to memory of 480 1012 ebook_reader_setup.tmp 42 PID 1012 wrote to memory of 480 1012 ebook_reader_setup.tmp 42 PID 1012 wrote to memory of 480 1012 ebook_reader_setup.tmp 42 PID 1012 wrote to memory of 480 1012 ebook_reader_setup.tmp 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebook.exe.org.exe"C:\Users\Admin\AppData\Local\Temp\ebook.exe.org.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\is-FT0QC.tmp\ebook.exe.org.tmp"C:\Users\Admin\AppData\Local\Temp\is-FT0QC.tmp\ebook.exe.org.tmp" /SL5="$400EA,28982256,486912,C:\Users\Admin\AppData\Local\Temp\ebook.exe.org.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://icecreamapps.com/Ebook-Reader/thankyou.html?v=5.213⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
-
C:\Program Files (x86)\Icecream Ebook Reader\ebookreader.exe"C:\Program Files (x86)\Icecream Ebook Reader\ebookreader.exe" -inst3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://icecreamapps.com/Download-Ebook-Reader/4⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:796
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBXRT4TL\ebook_reader_setup.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBXRT4TL\ebook_reader_setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\is-O3LR2.tmp\ebook_reader_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-O3LR2.tmp\ebook_reader_setup.tmp" /SL5="$30172,28964596,486912,C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PBXRT4TL\ebook_reader_setup.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://icecreamapps.com/Ebook-Reader/thankyou.html?v=5.307⤵PID:1700
-
-
C:\Program Files (x86)\Icecream Ebook Reader\ebookreader.exe"C:\Program Files (x86)\Icecream Ebook Reader\ebookreader.exe" -inst7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:480
-
-
-
-
-
-