Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16/02/2022, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe
Resource
win10v2004-en-20220113
General
-
Target
bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe
-
Size
363KB
-
MD5
f83cef2bf33a4d43e58b771e81af3ecc
-
SHA1
12133b783cef924cbc2911deb11cba148d97dad4
-
SHA256
bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015
-
SHA512
0d0ed1846d8cf5cba89c1eaa952110b420b4ef0684f4b4c00bd7db47e5d6f72639a90e3725520b5502dbfe35b8a875256b5163bcee25b2264d0e2dfe210e5c9a
Malware Config
Extracted
C:\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/6c2b0cc87c8f6f0e
https://mazedecrypt.top/6c2b0cc87c8f6f0e
Signatures
-
Maze
Ransomware family also known as ChaCha.
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
description pid Process procid_target PID 1440 created 5004 1440 WerFault.exe 100 PID 276 created 4280 276 WerFault.exe 110 -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ExportStep.tiff bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\RequestMeasure.png => C:\Users\Admin\Pictures\RequestMeasure.png.AnWVF bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\UndoCheckpoint.png => C:\Users\Admin\Pictures\UndoCheckpoint.png.WuBrHv bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\UnregisterSelect.png => C:\Users\Admin\Pictures\UnregisterSelect.png.WuBrHv bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Users\Admin\Pictures\ConfirmSend.tiff bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\ConfirmSend.tiff => C:\Users\Admin\Pictures\ConfirmSend.tiff.s7rl0 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Users\Admin\Pictures\LockDismount.tiff bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\LockDismount.tiff => C:\Users\Admin\Pictures\LockDismount.tiff.nmXIz bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\ResumeSync.tif => C:\Users\Admin\Pictures\ResumeSync.tif.AnWVF bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\UndoSet.png => C:\Users\Admin\Pictures\UndoSet.png.WuBrHv bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\CompleteHide.raw => C:\Users\Admin\Pictures\CompleteHide.raw.s7rl0 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File renamed C:\Users\Admin\Pictures\ExportStep.tiff => C:\Users\Admin\Pictures\ExportStep.tiff.nmXIz bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DECRYPT-FILES.txt bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6c2b0cc87c8f6f0e.tmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\DECRYPT-FILES.txt bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\6c2b0cc87c8f6f0e.tmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\000.bmp" bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe -
Drops file in Program Files directory 40 IoCs
description ioc Process File opened for modification C:\Program Files\ConfirmTest.xlsb bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\RenameWatch.bmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\SubmitRepair.ico bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\InvokePush.otf bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\MeasureDisconnect.midi bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ResolveSend.m3u bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\TraceEnable.mov bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\6c2b0cc87c8f6f0e.tmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\CopyRevoke.pps bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\DisableBlock.wps bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\GetResolve.contact bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File created C:\Program Files (x86)\DECRYPT-FILES.txt bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\WaitProtect.dib bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files (x86)\6c2b0cc87c8f6f0e.tmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\BackupConvert.wm bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\MoveSplit.mid bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ResizeProtect.wmv bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\StartPublish.css bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ConvertFromExit.tmp bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ExportExpand.wpl bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\OpenMerge.DVR bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ResetHide.vsx bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\WaitUndo.cfg bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ResizeAssert.m3u bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\SubmitSearch.potx bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\UnprotectApprove.ex_ bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\WaitProtect.aif bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\RegisterLimit.odt bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File created C:\Program Files\DECRYPT-FILES.txt bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\FormatReceive.mpeg2 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\LockGet.otf bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\PingCompare.xht bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\MountOpen.wm bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\BlockRestart.ini bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\DenyUnprotect.wma bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\DisableReset.vsdm bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\InstallGroup.wps bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\EnterComplete.mp4 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\ReceiveDisconnect.mpeg bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe File opened for modification C:\Program Files\WatchAssert.wav bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3020 5004 WerFault.exe 100 2524 4280 WerFault.exe 110 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Modifies registry class 55 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1862" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1862" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6390" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1210" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "3687" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "3687" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1862" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "3687" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2254" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1944" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6390" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1210" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2254" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6390" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "1210" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2254" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1676 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe 1676 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe 3020 WerFault.exe 3020 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeBackupPrivilege 1744 vssvc.exe Token: SeRestorePrivilege 1744 vssvc.exe Token: SeAuditPrivilege 1744 vssvc.exe Token: SeShutdownPrivilege 4224 svchost.exe Token: SeCreatePagefilePrivilege 4224 svchost.exe Token: SeShutdownPrivilege 4224 svchost.exe Token: SeCreatePagefilePrivilege 4224 svchost.exe Token: SeShutdownPrivilege 4224 svchost.exe Token: SeCreatePagefilePrivilege 4224 svchost.exe Token: SeIncreaseQuotaPrivilege 4044 wmic.exe Token: SeSecurityPrivilege 4044 wmic.exe Token: SeTakeOwnershipPrivilege 4044 wmic.exe Token: SeLoadDriverPrivilege 4044 wmic.exe Token: SeSystemProfilePrivilege 4044 wmic.exe Token: SeSystemtimePrivilege 4044 wmic.exe Token: SeProfSingleProcessPrivilege 4044 wmic.exe Token: SeIncBasePriorityPrivilege 4044 wmic.exe Token: SeCreatePagefilePrivilege 4044 wmic.exe Token: SeBackupPrivilege 4044 wmic.exe Token: SeRestorePrivilege 4044 wmic.exe Token: SeShutdownPrivilege 4044 wmic.exe Token: SeDebugPrivilege 4044 wmic.exe Token: SeSystemEnvironmentPrivilege 4044 wmic.exe Token: SeRemoteShutdownPrivilege 4044 wmic.exe Token: SeUndockPrivilege 4044 wmic.exe Token: SeManageVolumePrivilege 4044 wmic.exe Token: 33 4044 wmic.exe Token: 34 4044 wmic.exe Token: 35 4044 wmic.exe Token: 36 4044 wmic.exe Token: SeIncreaseQuotaPrivilege 4044 wmic.exe Token: SeSecurityPrivilege 4044 wmic.exe Token: SeTakeOwnershipPrivilege 4044 wmic.exe Token: SeLoadDriverPrivilege 4044 wmic.exe Token: SeSystemProfilePrivilege 4044 wmic.exe Token: SeSystemtimePrivilege 4044 wmic.exe Token: SeProfSingleProcessPrivilege 4044 wmic.exe Token: SeIncBasePriorityPrivilege 4044 wmic.exe Token: SeCreatePagefilePrivilege 4044 wmic.exe Token: SeBackupPrivilege 4044 wmic.exe Token: SeRestorePrivilege 4044 wmic.exe Token: SeShutdownPrivilege 4044 wmic.exe Token: SeDebugPrivilege 4044 wmic.exe Token: SeSystemEnvironmentPrivilege 4044 wmic.exe Token: SeRemoteShutdownPrivilege 4044 wmic.exe Token: SeUndockPrivilege 4044 wmic.exe Token: SeManageVolumePrivilege 4044 wmic.exe Token: 33 4044 wmic.exe Token: 34 4044 wmic.exe Token: 35 4044 wmic.exe Token: 36 4044 wmic.exe Token: 33 2208 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2208 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5004 SearchApp.exe 4280 SearchApp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4044 1676 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe 95 PID 1676 wrote to memory of 4044 1676 bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe 95 PID 1440 wrote to memory of 5004 1440 WerFault.exe 100 PID 1440 wrote to memory of 5004 1440 WerFault.exe 100 PID 276 wrote to memory of 4280 276 WerFault.exe 110 PID 276 wrote to memory of 4280 276 WerFault.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe"C:\Users\Admin\AppData\Local\Temp\bba288819f375cbdd1a274609924aeba786e1d1b43065846a85e30bc998d9015.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\wbem\wmic.exe"C:\e\..\Windows\emr\gayww\edgjj\..\..\..\system32\wlh\..\wbem\istvf\..\wmic.exe" shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5004 -s 45282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:408
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 420 -p 5004 -ip 50041⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:1440
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4280 -s 36162⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 520 -p 4280 -ip 42801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:276