Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
06-03-2022 05:24
Static task
static1
Behavioral task
behavioral1
Sample
bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe
Resource
win10v2004-en-20220112
General
-
Target
bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe
-
Size
2.7MB
-
MD5
e3383885e03608cd7784ba4690493e26
-
SHA1
b87077a44d2a2e75a3ded415feea4056be1559f0
-
SHA256
bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f
-
SHA512
e957d2582e13a998cf3dc165be7a3852df19f469f212411545bc73afb36944be842826c0105045d47d9b4e9ef52f26f0612ce83ca37064efb567a3a420efb93f
Malware Config
Extracted
C:\Unlock_All_Files.txt
https://drive.google.com/file/d/1L1qeBgY_AfjYVgO8FEZsViJxK4TBWXZI/view
https://t.me/filedecrypt002
https://www.bestbitcoinexchange.io
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessVDI2019_eula.txt.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\ISO690Nmerical.XSL.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-TW\msipc.dll.mui.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\Office Setup Controller\Office.en-us\BRANDING.XML.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\THMBNAIL.PNG.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscale_plugin.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ppd.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-pl.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\AXIS.ELM.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\grv_icons.exe.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\WebView2Loader.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub2019_eula.txt.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-80.png.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\FBIBLIO.DLL.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\vlc.mo.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription1-ul-oob.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_OEM_Perp-ppd.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-ul-oob.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\msmdsrv.rll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\libdirectsound_plugin.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT-Rockwell.xml.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteFreeR_Bypass-ppd.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ul-oob.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ul-phn.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\STUDIO.INF.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_plugin.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\libvdummy_plugin.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ul-phn.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTest-ul-oob.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-tabcontrol_ja.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\.lastModified.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Office 2007 - 2010.xml.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.FileUtils.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libdemux_chromecast_plugin.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaBrightDemiBold.ttf.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_ja_4.4.0.v20140623020002.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_KMS_Automation-ul-oob.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Trial-pl.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSSOAP30.DLL.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\THMBNAIL.PNG.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme_0.9.300.v20140424-2042.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\basicstylish.dotx.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_profile.png.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jre1.8.0_66\bin\ssv.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PPINTL.DLL.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL082.XML.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_zh_CN.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART1.BDR.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-openide-execution.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jre1.8.0_66\bin\w2k_lsa_auth.dll.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\hive.xsl.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\7-Zip\Lang\eo.txt.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\messages_pt_BR.properties.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSORES.DLL.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\Informix.xsl.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.operations_2.4.0.v20131119-0908.jar.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Warm.xml.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ppd.xrm-ms.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe File created C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE.Email=[[email protected]]ID=[ERSHGVROWVEJMHAB].encrypt bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 2952 2760 WerFault.exe 85 3940 3864 WerFault.exe 91 3284 1956 WerFault.exe 94 2544 1880 WerFault.exe 97 680 3008 WerFault.exe 100 -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe -
Kills process with taskkill 3 IoCs
pid Process 2188 taskkill.exe 3776 taskkill.exe 1948 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "0" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "11.0.2016.0129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "55" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "1613" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "002D 002D 0021 0021 0026 0026 002C 002C 002E 002E 003F 003F 005F 005F 002B 002B 002A 002A 02C9 02C9 02CA 02CA 02C7 02C7 02CB 02CB 02D9 02D9 3000 3000 3105 3105 3106 3106 3107 3107 3108 3108 3109 3109 310A 310A 310B 310B 310C 310C 310D 310D 310E 310E 310F 310F 3110 3110 3111 3111 3112 3112 3113 3113 3114 3114 3115 3115 3116 3116 3117 3117 3118 3118 3119 3119 3127 3127 3128 3128 3129 3129 311A 311A 311B 311B 311C 311C 311D 311D 311E 311E 311F 311F 3120 3120 3121 3121 3122 3122 3123 3123 3124 3124 3125 3125 3126 3126" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "CC" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "11.0.2013.1022" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "1949" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "22" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "55" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Spanish Phone Converter" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "16000" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\L1033" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\Speech_OneCore\\Engines\\TTS\\en-US\\MSTTSLocenUS.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "You have selected %1 as the default voice." SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "0" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{2984A9DB-5689-43AD-877D-14999A15DD46}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\en-US\\sidubm.table" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "22" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft David - English (United States)" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com\NumberOfSubdomains = "0" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "0" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{BAE3E62C-37D4-49AC-A6F1-0E485ECD6757}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "409;9" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Discrete;Continuous" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Microsoft Speech Recognition Engine - en-US Embedded DNN v11.1" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Extensible Cache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Anywhere;Trailing" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "162" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "- 0001 ! 0002 & 0003 , 0004 . 0005 ? 0006 _ 0007 1 0008 2 0009 aa 000a ae 000b ah 000c ao 000d aw 000e ax 000f ay 0010 b 0011 ch 0012 d 0013 dh 0014 eh 0015 er 0016 ey 0017 f 0018 g 0019 h 001a ih 001b iy 001c jh 001d k 001e l 001f m 0020 n 0021 ng 0022 ow 0023 oy 0024 p 0025 r 0026 s 0027 sh 0028 t 0029 th 002a uh 002b uw 002c v 002d w 002e y 002f z 0030 zh 0031" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "3770" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "804" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{06405088-BC01-4E08-B392-5303E75090C8}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "Adult" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "0" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "{37A9D401-0BF5-4366-9530-C75C6DC23EC9}" SearchApp.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 3776 taskkill.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 2760 SearchApp.exe Token: SeDebugPrivilege 2760 SearchApp.exe Token: SeDebugPrivilege 2760 SearchApp.exe Token: SeDebugPrivilege 2760 SearchApp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2760 SearchApp.exe 3008 SearchApp.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2760 SearchApp.exe 3864 SearchApp.exe 1956 SearchApp.exe 1880 SearchApp.exe 3008 SearchApp.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1932 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 56 PID 1944 wrote to memory of 1932 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 56 PID 1932 wrote to memory of 2188 1932 cmd.exe 57 PID 1932 wrote to memory of 2188 1932 cmd.exe 57 PID 1944 wrote to memory of 3096 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 59 PID 1944 wrote to memory of 3096 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 59 PID 3096 wrote to memory of 3776 3096 cmd.exe 60 PID 3096 wrote to memory of 3776 3096 cmd.exe 60 PID 1944 wrote to memory of 3480 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 61 PID 1944 wrote to memory of 3480 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 61 PID 3480 wrote to memory of 1948 3480 cmd.exe 62 PID 3480 wrote to memory of 1948 3480 cmd.exe 62 PID 1944 wrote to memory of 2408 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 63 PID 1944 wrote to memory of 2408 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 63 PID 1944 wrote to memory of 792 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 67 PID 1944 wrote to memory of 792 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 67 PID 1944 wrote to memory of 1272 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 68 PID 1944 wrote to memory of 1272 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 68 PID 1944 wrote to memory of 1188 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 69 PID 1944 wrote to memory of 1188 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 69 PID 1188 wrote to memory of 2108 1188 cmd.exe 70 PID 1188 wrote to memory of 2108 1188 cmd.exe 70 PID 1944 wrote to memory of 364 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 71 PID 1944 wrote to memory of 364 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 71 PID 364 wrote to memory of 2844 364 cmd.exe 72 PID 364 wrote to memory of 2844 364 cmd.exe 72 PID 2844 wrote to memory of 3500 2844 net.exe 73 PID 2844 wrote to memory of 3500 2844 net.exe 73 PID 1944 wrote to memory of 1812 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 77 PID 1944 wrote to memory of 1812 1944 bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe 77 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2108 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe"C:\Users\Admin\AppData\Local\Temp\bf9f31608deb672c319e79660504179b7f5c837cb5a5a21fed94bb8b7555401f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlservr.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlservr.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlceip.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlceip.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
-
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlwriter.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlwriter.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Admin\AppData /s /q"2⤵PID:2408
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Default\AppData /s /q"2⤵PID:792
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\Users\Public\AppData /s /q"2⤵PID:1272
-
-
C:\Windows\system32\cmd.execmd /C "attrib +h +s Encrypt.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\attrib.exeattrib +h +s Encrypt.exe3⤵
- Views/modifies file attributes
PID:2108
-
-
-
C:\Windows\system32\cmd.execmd /C "net stop MSSQL$SQLEXPRESS"2⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\net.exenet stop MSSQL$SQLEXPRESS3⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:3500
-
-
-
-
C:\Windows\system32\cmd.execmd /C "rmdir C:\$Recycle.Bin /s /q"2⤵PID:1812
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy1⤵PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2760 -s 39402⤵
- Program crash
PID:2952
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 2760 -ip 27601⤵PID:3404
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3864 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3864 -s 39042⤵
- Program crash
PID:3940
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 520 -p 3864 -ip 38641⤵PID:2752
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1956 -s 38802⤵
- Program crash
PID:3284
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 540 -p 1956 -ip 19561⤵PID:3448
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1880 -s 38882⤵
- Program crash
PID:2544
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 496 -p 1880 -ip 18801⤵PID:3344
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3008 -s 39322⤵
- Program crash
PID:680
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 504 -p 3008 -ip 30081⤵PID:2396
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:452