Analysis
-
max time kernel
180s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-02-2022 06:40
Static task
static1
Behavioral task
behavioral1
Sample
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe
Resource
win10v2004-en-20220113
General
-
Target
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe
-
Size
53KB
-
MD5
0371b969f310c5dfbdd79c7cf9658cb3
-
SHA1
70cbd69f69ce164dae29febfca371ea30f2fbd62
-
SHA256
a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55
-
SHA512
39ae060fd0d0eeffc3f1df2e872a8bf31d5e80553197523e56629178a5b7fbf56e8654f7b55cb2f9d540d22d326f109d2abeec837f1c66582a6297c8b5dbadd3
Malware Config
Extracted
C:\how_to_back_files.html
http-equiv="Content-Type"
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 3212 created 2684 3212 WerFault.exe 96 PID 4420 created 3264 4420 WerFault.exe 103 -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\EditAdd.crw => C:\Users\Admin\Pictures\EditAdd.crw.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Pictures\UninstallImport.tiff a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File renamed C:\Users\Admin\Pictures\UninstallImport.tiff => C:\Users\Admin\Pictures\UninstallImport.tiff.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File renamed C:\Users\Admin\Pictures\UnlockSet.raw => C:\Users\Admin\Pictures\UnlockSet.raw.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Pictures\UnlockUnpublish.tiff a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File renamed C:\Users\Admin\Pictures\UnlockUnpublish.tiff => C:\Users\Admin\Pictures\UnlockUnpublish.tiff.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File renamed C:\Users\Admin\Pictures\UnprotectGroup.crw => C:\Users\Admin\Pictures\UnprotectGroup.crw.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File renamed C:\Users\Admin\Pictures\AssertGroup.raw => C:\Users\Admin\Pictures\AssertGroup.raw.FOREST a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe" a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe -
Drops desktop.ini file(s) 20 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Music\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Libraries\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Downloads\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Documents\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Searches\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Pictures\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Music\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Videos\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Videos\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Links\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe File opened for modification C:\Users\Public\Desktop\desktop.ini a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3512 2684 WerFault.exe 96 3464 3264 WerFault.exe 103 -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "5722" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "5722" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "5722" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2254" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2254" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2254" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2255" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2255" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2255" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1944" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1944" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1944" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1944" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1944" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3512 WerFault.exe 3512 WerFault.exe 3464 WerFault.exe 3464 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeShutdownPrivilege 204 svchost.exe Token: SeCreatePagefilePrivilege 204 svchost.exe Token: SeShutdownPrivilege 204 svchost.exe Token: SeCreatePagefilePrivilege 204 svchost.exe Token: SeShutdownPrivilege 204 svchost.exe Token: SeCreatePagefilePrivilege 204 svchost.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe Token: SeBackupPrivilege 936 TiWorker.exe Token: SeRestorePrivilege 936 TiWorker.exe Token: SeSecurityPrivilege 936 TiWorker.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2684 SearchApp.exe 3264 SearchApp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2684 3212 WerFault.exe 96 PID 3212 wrote to memory of 2684 3212 WerFault.exe 96 PID 4420 wrote to memory of 3264 4420 WerFault.exe 103 PID 4420 wrote to memory of 3264 4420 WerFault.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe"C:\Users\Admin\AppData\Local\Temp\a4539f0a3745030f91e97d59b937f8bfcd1f9430cabf65f08e280291b6d64f55.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:204
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2684 -s 45362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:408
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 2684 -ip 26841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3212
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:936
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3264 -s 38922⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 3264 -ip 32641⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4420