Analysis
-
max time kernel
167s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
11-02-2022 06:56
Static task
static1
Behavioral task
behavioral1
Sample
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
Resource
win10v2004-en-20220113
General
-
Target
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe
-
Size
105KB
-
MD5
467cceb1ab90bf50dc35f65dc513a483
-
SHA1
907c7792120b5aee6970b4b13747a729fbd59f7d
-
SHA256
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718
-
SHA512
e85f314c33cb521ea3dabec4b2fcfde61a5bab2e5b06a2eb0268f0c35c510318a6510dd77bc2bfa11b7350533adf659895a440ee1496d335843dfad712121f1c
Malware Config
Extracted
C:\0_HELP_DECRYPT_FILE.html
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 4004 created 4944 4004 WerFault.exe SearchApp.exe PID 3748 created 4084 3748 WerFault.exe SearchApp.exe -
Executes dropped EXE 1 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exepid process 3492 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process File renamed C:\Users\Admin\Pictures\CloseRequest.raw => C:\Users\Admin\Pictures\CloseRequest.raw.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\SearchGroup.crw => C:\Users\Admin\Pictures\SearchGroup.crw.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Pictures\UseFind.tiff 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Pictures\AssertConvert.tiff 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\AssertConvert.tiff => C:\Users\Admin\Pictures\AssertConvert.tiff.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\EnterCompress.crw => C:\Users\Admin\Pictures\EnterCompress.crw.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\JoinRename.raw => C:\Users\Admin\Pictures\JoinRename.raw.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\SaveTest.raw => C:\Users\Admin\Pictures\SaveTest.raw.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File renamed C:\Users\Admin\Pictures\UseFind.tiff => C:\Users\Admin\Pictures\UseFind.tiff.lock 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 23 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process File opened for modification C:\Users\Public\Documents\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Links\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Videos\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Music\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Music\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Drops file in Program Files directory 64 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13153~1.55\MICROS~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\PWAHEL~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MICROS~4.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\COOKIE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MI391D~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\ELEVAT~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MI9C33~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MICROS~3.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\MSEDGE~2.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\MSEDGE~3.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13153~1.55\MICROS~2.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\970107~1.55\MSEDGE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe -
Drops file in Windows directory 7 IoCs
Processes:
svchost.exe53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\svchost.com 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4440 4944 WerFault.exe SearchApp.exe 3852 4084 WerFault.exe SearchApp.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
Processes:
SearchApp.exeSearchApp.exeWerFault.exeWerFault.exeSearchApp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 64 IoCs
Processes:
SearchApp.exeSearchApp.exeSearchApp.exe53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1886" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1933" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "22" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "55" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1886" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1826" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1933" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1944" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "22" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "5754" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1933" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2257" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6508" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6508" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "22" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1826" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6508" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "5754" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exeWerFault.exeWerFault.exepid process 3492 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe 3492 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe 4440 WerFault.exe 4440 WerFault.exe 3852 WerFault.exe 3852 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 3728 svchost.exe Token: SeCreatePagefilePrivilege 3728 svchost.exe Token: SeShutdownPrivilege 3728 svchost.exe Token: SeCreatePagefilePrivilege 3728 svchost.exe Token: SeShutdownPrivilege 3728 svchost.exe Token: SeCreatePagefilePrivilege 3728 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SearchApp.exeSearchApp.exeSearchApp.exepid process 4908 SearchApp.exe 4944 SearchApp.exe 4084 SearchApp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exeWerFault.exeWerFault.exedescription pid process target process PID 3528 wrote to memory of 3492 3528 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe PID 3528 wrote to memory of 3492 3528 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe PID 3528 wrote to memory of 3492 3528 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe 53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe PID 4004 wrote to memory of 4944 4004 WerFault.exe SearchApp.exe PID 4004 wrote to memory of 4944 4004 WerFault.exe SearchApp.exe PID 3748 wrote to memory of 4084 3748 WerFault.exe SearchApp.exe PID 3748 wrote to memory of 4084 3748 WerFault.exe SearchApp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"C:\Users\Admin\AppData\Local\Temp\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:2164
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4944 -s 43482⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 4944 -ip 49441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:4004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4084 -s 38642⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 360 -p 4084 -ip 40841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:3748
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:60
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\INetCache\Q5MJBNZQ\X6j0qPgNij1n_IogMJrgYaT9Kp8[1].jsMD5
8c82fd065b817078dd8befefd90db935
SHA13e92d13ea6a8f09419f52253a3af06d007620898
SHA256c5af42879c3d89b2d309c0f30a1bc8231da6fe4377528133f219923654c9b177
SHA5128837a5f5a661fea36697e8e62347cce6256ab884e5c1ac5ca474a3aba1d9ff8ffeb31da982e3febd54fde37ac206a0a60946c32e0d465c019a08a63eba584829
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\3ZL5QLBD\www.bing[1].xmlMD5
d63a83d5e4e34d47ae55ea16456432aa
SHA12dd06a77d5b45d7b630676d124cd37f2d6cce94a
SHA2568e331487bec5a02f001a60d85ece3c3e6cb92e260ba3323a878a642c10171b66
SHA512606a8d2d0ef85f06282ddb255a5dc711cf4ff289dcceba70cdadc9127d4c6d22a76ddb2033f2253f010ae197234194bd5b500eb5fcbb8d8dee738dac9728bf43
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\3ZL5QLBD\www.bing[1].xmlMD5
5e5877ffacf0a0ebfcece7c62853b4c9
SHA1808b323bb0eb5cf3171d0c7a234008ee1ae0dd9f
SHA256fa48d6e4ce33dd55685cf599671749b3ba348db27183c43c68a97f71863e8a50
SHA512d865515eb254186c8e8b81786e3dc082104f83f894f6143330b3773efbc5819653cd531b571d0b03d79b82c9a9d4a22b3f66955544b7dafde217d762ce8f0360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exeMD5
694034feb1457fc087fcf8bfdbbeb1a5
SHA1c2732292c3d8b9e39b5e09e2fa0c07a9523201db
SHA256a65f644e5b9be65233b0e826ad5f8ecfd0f084c656a667c91fd7405dd98b5c48
SHA5123ea14a798cc7714e354c7ab0cbe690f58a21b3c086a16593a3a6d2a079bce1b7d74fdaf270037b3cb4af50024998491111c376ad0f372fe872dbb0f6ece8b428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\53c444745c8fb794e800f8634af9986c6e0e4b025d760950409bb823a461d718.exeMD5
694034feb1457fc087fcf8bfdbbeb1a5
SHA1c2732292c3d8b9e39b5e09e2fa0c07a9523201db
SHA256a65f644e5b9be65233b0e826ad5f8ecfd0f084c656a667c91fd7405dd98b5c48
SHA5123ea14a798cc7714e354c7ab0cbe690f58a21b3c086a16593a3a6d2a079bce1b7d74fdaf270037b3cb4af50024998491111c376ad0f372fe872dbb0f6ece8b428
-
C:\Users\All Users\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\setup.exeMD5
21047a4f4a46269068cc7c1c01a71cef
SHA17d2e76671340543f9d8f8ed1eb8e0ce9c87ac01f
SHA256a72a3b660eb3ab04fde1aa6159fc13cd6b1e71e6c3c24731d8e02ce7d1930939
SHA512f6d92c73999f52f0dfc019c04f3d89d41496812adbcd702959c2975ecf810fcde2662b824efaf77ffaece64665c629f5175aefef377a4b9659510d85f9e68a92
-
memory/2164-134-0x000002507FF60000-0x000002507FF70000-memory.dmpFilesize
64KB
-
memory/2164-135-0x0000025000100000-0x0000025000110000-memory.dmpFilesize
64KB
-
memory/2164-142-0x00000250026C0000-0x00000250026C4000-memory.dmpFilesize
16KB
-
memory/3728-154-0x0000025F5BDD0000-0x0000025F5BDD4000-memory.dmpFilesize
16KB