Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2022 21:21
Behavioral task
behavioral1
Sample
7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe
Resource
win10v2004-20220812-en
General
-
Target
7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe
-
Size
30KB
-
MD5
0d7eb2137c2d696071df27cc6a601a5a
-
SHA1
f3e487886630e0729fb4b4967cd11c2ee0daa989
-
SHA256
7fa0fc4b901ff3bb9002f33b4a7f0a01aef10f36c8304d26cdbf0934a9fd816f
-
SHA512
1b6f45cd581d3cd8292d8b97b840473eddb5239ce07037a8d34cf1530dc6c35613591e1d06f56453b50060d0df8d6066cc675a8cde3018220547597515e8f662
-
SSDEEP
768:8t6+ztmVfbHmHS8/ckpKd75wiqjUKPO6AAb3vM8pYwA:2ztmJbHmHT/zKdVwigUAAK3qw
Malware Config
Extracted
\??\M:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Extracted
\??\M:\Boot\bg-BG\ReadMe.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?403RSUVXZAC
https://yip.su/2QstD5
Extracted
redline
0025
216.52.57.15:38185
-
auth_value
e3493445b68f497cdc542eee79f1a761
Signatures
-
Detects Smokeloader packer 2 IoCs
resource yara_rule behavioral2/memory/4936-132-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/4936-133-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000022f7a-142.dat family_redline behavioral2/files/0x0007000000022f7a-143.dat family_redline behavioral2/memory/4672-152-0x00000000008F0000-0x0000000000910000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 740 266F.exe 4452 2D75.exe 4672 3219.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompressRename.png => C:\Users\Admin\Pictures\CompressRename.png.r2u 2D75.exe File renamed C:\Users\Admin\Pictures\ConfirmAssert.crw => C:\Users\Admin\Pictures\ConfirmAssert.crw.r2u 2D75.exe File opened for modification C:\Users\Admin\Pictures\DenyExport.tiff 2D75.exe File renamed C:\Users\Admin\Pictures\DenyExport.tiff => C:\Users\Admin\Pictures\DenyExport.tiff.r2u 2D75.exe File renamed C:\Users\Admin\Pictures\CompressInitialize.crw => C:\Users\Admin\Pictures\CompressInitialize.crw.r2u 2D75.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 2D75.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\2D75.exe" 2D75.exe -
Drops desktop.ini file(s) 19 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Music\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2D75.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2D75.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2D75.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 266F.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2D75.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2D75.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2D75.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2D75.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2D75.exe File opened for modification C:\Program Files\desktop.ini 266F.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2D75.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2D75.exe File opened for modification C:\Users\Public\desktop.ini 2D75.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 266F.exe File opened (read-only) \??\E: 266F.exe File opened (read-only) \??\A: 266F.exe File opened (read-only) \??\S: 266F.exe File opened (read-only) \??\X: 266F.exe File opened (read-only) \??\H: 266F.exe File opened (read-only) \??\B: 266F.exe File opened (read-only) \??\T: 266F.exe File opened (read-only) \??\P: 266F.exe File opened (read-only) \??\L: 266F.exe File opened (read-only) \??\Z: 266F.exe File opened (read-only) \??\M: Process not Found File opened (read-only) \??\Q: 266F.exe File opened (read-only) \??\G: 266F.exe File opened (read-only) \??\N: 266F.exe File opened (read-only) \??\R: 266F.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\U: 266F.exe File opened (read-only) \??\I: 266F.exe File opened (read-only) \??\J: 266F.exe File opened (read-only) \??\V: 266F.exe File opened (read-only) \??\M: 266F.exe File opened (read-only) \??\W: 266F.exe File opened (read-only) \??\Y: 266F.exe File opened (read-only) \??\O: 266F.exe File opened (read-only) \??\F: 266F.exe File opened (read-only) \??\M: explorer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\ReadMe.txt 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ul-phn.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7cm_es.dub 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GARA.TTF 266F.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\ReadMe.txt 266F.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-settings.xml 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_Subscription-ppd.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\SharePointPortalSite.ico 266F.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\ReadMe.txt 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.sat4j.pb_2.3.5.v201404071733.jar 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\THMBNAIL.PNG 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\MANIFEST.MF 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable.nl_ja_4.4.0.v20140623020002.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.p2.ui.overridden_5.5.0.165303.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\imap.jar 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-ppd.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-checkmark.png 266F.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\ShapeCollector.exe.mui 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyLocale_it.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\attach.dll 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-modules-queries.xml 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_ja.jar 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial2-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.application_5.5.0.165303.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20131211-1531.jar 266F.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\cmm\CIEXYZ.pf 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_OEM_Perp-ul-phn.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Document.dll 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\cpprestsdk.dll 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.properties 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_ja.jar 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOS.TTF 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaSansRegular.ttf 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-progress-ui.jar 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ppd.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-crt-filesystem-l1-1-0.dll 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\api-ms-win-crt-locale-l1-1-0.dll 266F.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\iexplore.exe.mui 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Trial-pl.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-phn.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.MsoInterop.dll 266F.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-time-l1-1-0.dll 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppvIsvSubsystems32.dll 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_zh_4.4.0.v20140623020002.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-services.xml 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-api-visual.jar 266F.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-api-annotations-common.xml 266F.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jsdt.dll 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ul-oob.xrm-ms 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymsb.ttf 266F.exe File created C:\Program Files\Common Files\System\ado\es-ES\ReadMe.txt 266F.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\RIPPLE.ELM 266F.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2860 4360 WerFault.exe 96 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKw = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2216" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "7357" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "9734" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{D69C756C-FDF8-4644-8671-CB0724A4B6C7} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKw SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "7357" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "9734" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "9734" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2216" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2699" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2699" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2216" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "7357" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2699" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4936 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe 4936 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4936 7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe 3060 Process not Found 3060 Process not Found 3060 Process not Found 3060 Process not Found -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 3060 Process not Found Token: SeCreatePagefilePrivilege 3060 Process not Found Token: SeShutdownPrivilege 4972 explorer.exe Token: SeCreatePagefilePrivilege 4972 explorer.exe Token: SeShutdownPrivilege 4972 explorer.exe Token: SeCreatePagefilePrivilege 4972 explorer.exe Token: SeShutdownPrivilege 4972 explorer.exe Token: SeCreatePagefilePrivilege 4972 explorer.exe Token: SeShutdownPrivilege 4972 explorer.exe Token: SeCreatePagefilePrivilege 4972 explorer.exe Token: SeShutdownPrivilege 4972 explorer.exe Token: SeCreatePagefilePrivilege 4972 explorer.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3060 Process not Found 3060 Process not Found 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 3060 Process not Found 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe 4972 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 SearchApp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3060 wrote to memory of 740 3060 Process not Found 92 PID 3060 wrote to memory of 740 3060 Process not Found 92 PID 3060 wrote to memory of 740 3060 Process not Found 92 PID 3060 wrote to memory of 4452 3060 Process not Found 93 PID 3060 wrote to memory of 4452 3060 Process not Found 93 PID 3060 wrote to memory of 4452 3060 Process not Found 93 PID 3060 wrote to memory of 4672 3060 Process not Found 95 PID 3060 wrote to memory of 4672 3060 Process not Found 95 PID 3060 wrote to memory of 4672 3060 Process not Found 95 PID 3060 wrote to memory of 4360 3060 Process not Found 96 PID 3060 wrote to memory of 4360 3060 Process not Found 96 PID 3060 wrote to memory of 4360 3060 Process not Found 96 PID 3060 wrote to memory of 4360 3060 Process not Found 96 PID 3060 wrote to memory of 3668 3060 Process not Found 97 PID 3060 wrote to memory of 3668 3060 Process not Found 97 PID 3060 wrote to memory of 3668 3060 Process not Found 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe"C:\Users\Admin\AppData\Local\Temp\7FA0FC4B901FF3BB9002F33B4A7F0A01AEF10F36C8304.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4936
-
C:\Users\Admin\AppData\Local\Temp\266F.exeC:\Users\Admin\AppData\Local\Temp\266F.exe1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
PID:740
-
C:\Users\Admin\AppData\Local\Temp\2D75.exeC:\Users\Admin\AppData\Local\Temp\2D75.exe1⤵
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:4452
-
C:\Users\Admin\AppData\Local\Temp\3219.exeC:\Users\Admin\AppData\Local\Temp\3219.exe1⤵
- Executes dropped EXE
PID:4672
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 8762⤵
- Program crash
PID:2860
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4360 -ip 43601⤵PID:4968
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1104
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57c70ec63db5217ca12e921af903b6376
SHA158edf5627b21da76775bfb36b229e35d99c6918a
SHA256e682a7ec6d5303650e7b5ba99251d6307fad956ffbc3ddb8368eafbd3895c4e8
SHA51289fd64f71f44d24589c9b5115037df6c765b550e28d712e33eb5ad4568edd3e73189ee8dee19d3ffb05b2f88d039840bc466cbe993a1e4d43cdfa7ed434e83d5
-
Filesize
1KB
MD5130d15ef1fd65b768b1925c324e1cea1
SHA128f22eaaf35f6c20bf986f2bf16296581cea7094
SHA256c4207869df58da7989140a69b83d9890cd6dcd65808e75571cf929e218c1c538
SHA5121a43a0da3841efc76a8a958634b2f442451ccd30e5243ffb5d2f88b6ef1c54f74f8e31ba6f2054e429e9667845aaa11f613eb91662f92e74ab8dc008fff22d70
-
Filesize
3KB
MD53d85374fa81c89484ef4740c29b509ba
SHA1172458e4d26fd3f02a135bf5620256e00535012f
SHA2563c28aaf4c754a448263f19a6763cd699fcb8f8195653f02f2b9104cb48537fb1
SHA5126d7498ce15893a98713a1c91346e3e5fc18e2263e15c44ace8b6b9ff0545c8a79449b7e1fe4aa75b7a17e9c0985e243d55e344f1af7cd5d3e2f91fd3969b6c7c
-
Filesize
1KB
MD565fd7824536e11e25e332800d42dd3e3
SHA134e4778228e38d6a57fcb5d8979dc192672700a6
SHA2562ee8c1f1bb1b928984bd02bb979db3b6473a80bcdba4b849b7ab611d3ab76359
SHA51206be78f8a42cdb2ff67cc3df26c7f7888e37e050c7c2ef41b9bde744f88960b1787d62ed79977425851106f26f3ee4867259f7d222cc64db7fa5bb75afcc63c0
-
Filesize
1KB
MD5adc28f3553785b54202f31bf6a60fa29
SHA1994dec0134a5cb3af01c2d76105ca071ba99f71c
SHA25654b08a792366b4f4c213c03832772632ec8872e700250b6dda141677c0ec54c8
SHA512a5f6389a3fe6c38b7a9ce50a1f1ec9b47a3bb96d9550be83b1bb183c2725552aa7de987ad4a3f84bda38279be8f16fc5487a3b7d75dfe1f5c5cf2b01231dfa6f
-
Filesize
106KB
MD5957f3db87f8c9a1540269e6aa08c14b2
SHA114be1c43fbfb325858cda78a126528f82cf77ad2
SHA2562cb58713d1eff5ac37e8db040d25537c0e7bb6737c905a577fb257e4e4360f83
SHA512cd7089eb072c3eaccc474a1e8f4b60a3bcaa4fc60c2761f649ac91edbfe7b7389db60d8156fe1eadb8b78628c48bca115fabdb00d115451a85433272d875d463
-
Filesize
106KB
MD5957f3db87f8c9a1540269e6aa08c14b2
SHA114be1c43fbfb325858cda78a126528f82cf77ad2
SHA2562cb58713d1eff5ac37e8db040d25537c0e7bb6737c905a577fb257e4e4360f83
SHA512cd7089eb072c3eaccc474a1e8f4b60a3bcaa4fc60c2761f649ac91edbfe7b7389db60d8156fe1eadb8b78628c48bca115fabdb00d115451a85433272d875d463
-
Filesize
50KB
MD54c4a63e3906a19edb4e7f97419fa3033
SHA1afc257d249bd12e4a13a2c4fc7e1df44301228d3
SHA25616bb1dd92c0dcc2cc0a3057b15f2e50214cb79c225ab136a91f7918787678882
SHA512c18e3f8010f02b829c39e2488bca4cc5f9e9fc0c7055d4049490f79820793389fe6b55d37a6e4f24b57bb629aa9b0721323f409f5d84e3603d5eb742c70a5e50
-
Filesize
50KB
MD54c4a63e3906a19edb4e7f97419fa3033
SHA1afc257d249bd12e4a13a2c4fc7e1df44301228d3
SHA25616bb1dd92c0dcc2cc0a3057b15f2e50214cb79c225ab136a91f7918787678882
SHA512c18e3f8010f02b829c39e2488bca4cc5f9e9fc0c7055d4049490f79820793389fe6b55d37a6e4f24b57bb629aa9b0721323f409f5d84e3603d5eb742c70a5e50
-
Filesize
107KB
MD529c35719b1ad2a2106cfa7072877e86c
SHA1393a2b9a4bf4bc4711e51f3f62f21bc6fa93f9a5
SHA25616c1c4b955d4c9acfbba91c6267ed68a0e9826aab0eaa0f7e05a7cfbbde1ffe1
SHA512f740f53837ce94ea0dcdfa9ab3151e661624a15ab0b5e91ff970037333921907316bc51d61c2fefaf949e9f2a7c0de75e8ce20df1cb3f297d0d6039c982206ee
-
Filesize
107KB
MD529c35719b1ad2a2106cfa7072877e86c
SHA1393a2b9a4bf4bc4711e51f3f62f21bc6fa93f9a5
SHA25616c1c4b955d4c9acfbba91c6267ed68a0e9826aab0eaa0f7e05a7cfbbde1ffe1
SHA512f740f53837ce94ea0dcdfa9ab3151e661624a15ab0b5e91ff970037333921907316bc51d61c2fefaf949e9f2a7c0de75e8ce20df1cb3f297d0d6039c982206ee
-
Filesize
1KB
MD556384889ec0dfe1ace9fff5439e4cf8a
SHA18b48bc0b8de53bdb2a5bb542506c27d01acff681
SHA256cbdeff29c6cc659c7e61d45574ecc72c24267357522b8790fe0359004279756c
SHA512be6768886a659cd362e6099c0f99bb66873e61573e9d3b94c39a339f3ab7921de2736d179e6450cf9f5f4b93d2f0df4257097b7ece65226db8e5b423f669eb5d
-
Filesize
1KB
MD5a3794cabf4a20e95d66f19e27b0729b1
SHA1059b741fd2420875b182bba359573a1c0425887a
SHA256b3fbb4323596c2e8b00027da852963511794d9286683a06f46cdffa6314f5755
SHA512217a982464211aaf5d2f799d1cde039710c05def0d695dd0f1969f89c392651e52b39f7750965f919a0cda50a497d9c31acd68118e022da4ee981add92c480ae