Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe
Resource
win10v2004-20220812-en
General
-
Target
cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe
-
Size
275KB
-
MD5
edfd7032ec75bfc12d48fe4f308e50bb
-
SHA1
940b5154cdeba782919ad1dfeb743fcebef213df
-
SHA256
cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e
-
SHA512
ab52ce3dc02b3d7175b9c22659e3e2edf1d4110da99526cc4e60794144c832a5257160db1fc1c8af7e3aacb8d3f5c0712a5e10150a3bf1b9d65a2e4e80ad8e3d
-
SSDEEP
6144:Cp7IHOo+LPIsnAKUZQAdgUDYHf6XkAPTKl5ee:+hDrXBAdgdALeee
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pntqkflv = "{5D193B8C-4A91-4C4E-9CEB-E893038FA713}" eaqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\qegbdmwf = "{53CE9BE2-DB69-4969-A709-1AF64A4E6B52}" eaqm.exe -
Executes dropped EXE 4 IoCs
pid Process 1692 eaqm.exe 308 eaqm.exe 1064 tovafrnm.exe 908 eaqm.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Loads dropped DLL 25 IoCs
pid Process 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 2884 regsvr32.exe 320 regsvr32.exe 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{968E7D9C-275F-41D8-96B5-B7BD8B12FDEE} regsvr32.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\pntqkflv.dll cmd.exe File opened for modification C:\Windows\eaqm.exe cmd.exe File created C:\Windows\tovafrnm.exe cmd.exe File opened for modification C:\Windows\gxvpsafm.dll cmd.exe File created C:\Windows\eaqm.exe cmd.exe File created C:\Windows\pntqkflv.dll cmd.exe File created C:\Windows\gfetqaxsrnm.dll cmd.exe File opened for modification C:\Windows\gfetqaxsrnm.dll cmd.exe File created C:\Windows\qegbdmwf.dll cmd.exe File opened for modification C:\Windows\qegbdmwf.dll cmd.exe File created C:\Windows\gxvpsafm.dll cmd.exe File opened for modification C:\Windows\tovafrnm.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12} regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0\HELPDIR\ = "C:\\Windows\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62A08201-9C6C-4B33-A72F-9F343A263CDB} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5D193B8C-4A91-4C4E-9CEB-E893038FA713}\InProcServer32 eaqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\InprocServer32\ = "C:\\Windows\\gxvpsafm.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\TypeLib\ = "{EDA8FC39-2B22-4DF5-B697-3EB1C3EC07ED}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82D93F87-F52B-4417-BF0E-658F00645254}\TypeLib\ = "{EDA8FC39-2B22-4DF5-B697-3EB1C3EC07ED}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\gxvpsafm.ToolBar.1\CLSID\ = "{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\VersionIndependentProgID\ = "gxvpsafm" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EDA8FC39-2B22-4DF5-B697-3EB1C3EC07ED}\1.0\ = "gxvpsafm" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID eaqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0\FLAGS regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "9844" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2847" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2847" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\gxvpsafm.ToolBar.1\ = "gxvpsafm" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62A08201-9C6C-4B33-A72F-9F343A263CDB}\TypeLib\Version = "1.0" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62A08201-9C6C-4B33-A72F-9F343A263CDB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DFDADC3-06BE-43E9-84FC-2CB22575FA6B}\ = "Iaabw" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DFDADC3-06BE-43E9-84FC-2CB22575FA6B}\TypeLib regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "858" SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{82D93F87-F52B-4417-BF0E-658F00645254}\ = "Iblbw" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82D93F87-F52B-4417-BF0E-658F00645254} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82D93F87-F52B-4417-BF0E-658F00645254}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62A08201-9C6C-4B33-A72F-9F343A263CDB}\TypeLib\ = "{2189F803-251C-4BE7-B1C4-895D7C35DED4}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\gxvpsafm.blbw regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\gxvpsafm.blbw\CurVer\ = "gxvpsafm.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{968E7D9C-275F-41D8-96B5-B7BD8B12FDEE}\InprocServer32 regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "11659" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{82D93F87-F52B-4417-BF0E-658F00645254}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{82D93F87-F52B-4417-BF0E-658F00645254}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DFDADC3-06BE-43E9-84FC-2CB22575FA6B}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133048063971198244" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EDA8FC39-2B22-4DF5-B697-3EB1C3EC07ED}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0\ = "aabw TL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2189F803-251C-4BE7-B1C4-895D7C35DED4}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62A08201-9C6C-4B33-A72F-9F343A263CDB}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{968E7D9C-275F-41D8-96B5-B7BD8B12FDEE}\ = "QXK Olive" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{968E7D9C-275F-41D8-96B5-B7BD8B12FDEE}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{968E7D9C-275F-41D8-96B5-B7BD8B12FDEE}\TypeLib\ = "{2189F803-251C-4BE7-B1C4-895D7C35DED4}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{EDA8FC39-2B22-4DF5-B697-3EB1C3EC07ED}\1.0\HELPDIR\ = "C:\\Windows\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DFDADC3-06BE-43E9-84FC-2CB22575FA6B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node eaqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA815359-2AD7-4BCD-9A11-9AD7DADE2F12}\ProgID\ = "gxvpsafm.1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DFDADC3-06BE-43E9-84FC-2CB22575FA6B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 908 eaqm.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe Token: SeShutdownPrivilege 3844 explorer.exe Token: SeCreatePagefilePrivilege 3844 explorer.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe 3844 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 680 StartMenuExperienceHost.exe 5076 SearchApp.exe 3844 explorer.exe 3844 explorer.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1504 wrote to memory of 5028 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 80 PID 1504 wrote to memory of 5028 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 80 PID 1504 wrote to memory of 5028 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 80 PID 5028 wrote to memory of 1692 5028 cmd.exe 82 PID 5028 wrote to memory of 1692 5028 cmd.exe 82 PID 5028 wrote to memory of 1692 5028 cmd.exe 82 PID 5028 wrote to memory of 2884 5028 cmd.exe 83 PID 5028 wrote to memory of 2884 5028 cmd.exe 83 PID 5028 wrote to memory of 2884 5028 cmd.exe 83 PID 5028 wrote to memory of 308 5028 cmd.exe 84 PID 5028 wrote to memory of 308 5028 cmd.exe 84 PID 5028 wrote to memory of 308 5028 cmd.exe 84 PID 5028 wrote to memory of 320 5028 cmd.exe 85 PID 5028 wrote to memory of 320 5028 cmd.exe 85 PID 5028 wrote to memory of 320 5028 cmd.exe 85 PID 5028 wrote to memory of 1064 5028 cmd.exe 86 PID 5028 wrote to memory of 1064 5028 cmd.exe 86 PID 5028 wrote to memory of 1064 5028 cmd.exe 86 PID 5028 wrote to memory of 908 5028 cmd.exe 87 PID 5028 wrote to memory of 908 5028 cmd.exe 87 PID 5028 wrote to memory of 908 5028 cmd.exe 87 PID 1504 wrote to memory of 4016 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 89 PID 1504 wrote to memory of 4016 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 89 PID 1504 wrote to memory of 4016 1504 cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe"C:\Users\Admin\AppData\Local\Temp\cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd.exe /Q /C "C:\Users\Admin\AppData\Local\Temp\ac8zt2\install.bat"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\eaqm.exeeaqm.exe C:\Windows\pntqkflv.dll pntqkflv3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1692
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s gxvpsafm.dll3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\eaqm.exeeaqm.exe C:\Windows\qegbdmwf.dll qegbdmwf3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:308
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\gfetqaxsrnm.dll3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\tovafrnm.exetovafrnm.exe reg3⤵
- Executes dropped EXE
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\ac8zt2\eaqm.exeeaqm.exe redpv3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /Q /C C:\Users\Admin\AppData\Local\Temp\nsjF8EE.tmp.bat "C:\Users\Admin\AppData\Local\Temp\cfe38d97877912474e8e5976a5e3b5c3f6a6e07eace4286fc1da117c516f7a8e.exe"2⤵PID:4016
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:680
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ad4bd503c4ab76f2b57e0c47e5f0bc5b
SHA10d79c63285d1fb352408f3b60376a02807a8d00e
SHA2564b092c981974b7789d81785ccaf7a6e8795e5732ef6e0d44db222fb21234f3a6
SHA512c52de14dbc6f84e6a94cfb5e6c255bf2012c250bf6c6ae27958cf936bd83017fb0d4b3ce93f4ae044041473f8546fb58aff96498ed15f4c931edd7047b6223da
-
Filesize
92KB
MD5ad4bd503c4ab76f2b57e0c47e5f0bc5b
SHA10d79c63285d1fb352408f3b60376a02807a8d00e
SHA2564b092c981974b7789d81785ccaf7a6e8795e5732ef6e0d44db222fb21234f3a6
SHA512c52de14dbc6f84e6a94cfb5e6c255bf2012c250bf6c6ae27958cf936bd83017fb0d4b3ce93f4ae044041473f8546fb58aff96498ed15f4c931edd7047b6223da
-
Filesize
92KB
MD5ad4bd503c4ab76f2b57e0c47e5f0bc5b
SHA10d79c63285d1fb352408f3b60376a02807a8d00e
SHA2564b092c981974b7789d81785ccaf7a6e8795e5732ef6e0d44db222fb21234f3a6
SHA512c52de14dbc6f84e6a94cfb5e6c255bf2012c250bf6c6ae27958cf936bd83017fb0d4b3ce93f4ae044041473f8546fb58aff96498ed15f4c931edd7047b6223da
-
Filesize
92KB
MD5ad4bd503c4ab76f2b57e0c47e5f0bc5b
SHA10d79c63285d1fb352408f3b60376a02807a8d00e
SHA2564b092c981974b7789d81785ccaf7a6e8795e5732ef6e0d44db222fb21234f3a6
SHA512c52de14dbc6f84e6a94cfb5e6c255bf2012c250bf6c6ae27958cf936bd83017fb0d4b3ce93f4ae044041473f8546fb58aff96498ed15f4c931edd7047b6223da
-
Filesize
240KB
MD556350b52505be5b33b3c69425094b5e9
SHA105bbe7ec2a7f48129d4fd2a0a0dfbed80ce242e9
SHA256549d25cd481ab63454890f62b68361251b8a92c38ec772826b27193ebddfa39b
SHA512d8143682de33517b943d5916a247e40aa10206f5312a28a90868872d3b16969ebb16df9f77a81bb25b02cc39367c0c0fcf0c1c3970839419e7012afbfdd014ed
-
Filesize
148KB
MD54fb9addbf9fde39aec14a24287b8efd4
SHA14c7baabc200c29c74921639732eb4f210938e883
SHA256de31ee333fca8ce938152825da21ef19e77f88caa504766f7ffdb6f3ddf539fa
SHA512757862d1ddfd43f92d0051ba34ac3f04bd0afde930663adc7b57f33f6e96249b35329698711516ebc1f7130a284cf4513e1bde29e5df575a748851ca65cefbdd
-
Filesize
1KB
MD54b858b1490305b65bc7c81955dd6e0e3
SHA15db283c3780bbd1770849b3f4290a23e91c19d10
SHA256d13b1dfb5b752682b546eefcd7aa0b19bfc86d293496605658007a580517a22d
SHA5124d8c01eaf9b4718829ff951cddaa7cd3b351e70e0cad7a71d4e3cc2b11f632300da3bef6ba5d7189bae5719273ece3b3cd4fca2c8d5160a702019259e976f74a
-
Filesize
224KB
MD5530d1958d6dfb5d975728719c0c290c1
SHA158d66f7fa7673953f05ad3dc019c0f93a5379e9c
SHA256dec7d08f1c3cacda375565cc7fbfa2646b80df49a42d92504a8bf6580c96ce52
SHA512047cf24608f2f123d93e3ef610cdc102a15e81011cde6f157433a908b6a3d168bfdaec6a6749312f0e2f0de73cc4f2ad545bf00ffc06732c5afcdc106dba11fb
-
Filesize
176KB
MD55cfbea453290e8ed2c4e8a3bcd8254fa
SHA12c9ea9d3fae183d86905a36961ac3d48266c8200
SHA256e94b90ff3f40ef220a74d39b19853182ae02e9cec07c81d0ae2c583afed9e7d7
SHA51253fda5060124d9caf00108100f946168709978c64f34ba5c1dd31b45c0cd08bc447a80e5d1034381851a1bea0c032ada1c579d0245c5b628255b483865b9693b
-
Filesize
80KB
MD53235c140c22c395b8e7025d94db7228d
SHA1ddd458eef3520a67de972c005f7c38ac15b69fe1
SHA2561194f4772fd15e31d39c036678e35bde0df91ef4ed0b58f8dde78dede1d5ad92
SHA512c133640a0446f1340e2a6f11fe53183839fe4dff8461d8dbf77f9f13c97fc2118ee729ec8949ca502b997d9369af9d1eb02b5b93ca86a58d9a9ff8788b186709
-
Filesize
80KB
MD53235c140c22c395b8e7025d94db7228d
SHA1ddd458eef3520a67de972c005f7c38ac15b69fe1
SHA2561194f4772fd15e31d39c036678e35bde0df91ef4ed0b58f8dde78dede1d5ad92
SHA512c133640a0446f1340e2a6f11fe53183839fe4dff8461d8dbf77f9f13c97fc2118ee729ec8949ca502b997d9369af9d1eb02b5b93ca86a58d9a9ff8788b186709
-
Filesize
10KB
MD57d85b1f619a3023cc693a88f040826d2
SHA109f5d32f8143e7e0d9270430708db1b9fc8871a8
SHA256dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18
SHA5125465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
22KB
MD55afd4a9b7e69e7c6e312b2ce4040394a
SHA1fbd07adb3f02f866dc3a327a86b0f319d4a94502
SHA256053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae
SHA512f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511
-
Filesize
113B
MD5c4beb2dd75d05b14ae314fe60c496462
SHA1bb6c91733f2684b1e369dbd292d168f04e441344
SHA256e7506dca91329bcccc438239ba7501caa7340106930787ff145d2bde39690156
SHA512e111d36cfd70f286735e9d7a2571e929d3bf4c834a8b15b89fc21e4260023f97968fc436121a9b38f3e6c15b8721efaf27a04f25e6e9465d1b6929f95a9242cb
-
Filesize
240KB
MD556350b52505be5b33b3c69425094b5e9
SHA105bbe7ec2a7f48129d4fd2a0a0dfbed80ce242e9
SHA256549d25cd481ab63454890f62b68361251b8a92c38ec772826b27193ebddfa39b
SHA512d8143682de33517b943d5916a247e40aa10206f5312a28a90868872d3b16969ebb16df9f77a81bb25b02cc39367c0c0fcf0c1c3970839419e7012afbfdd014ed
-
Filesize
240KB
MD556350b52505be5b33b3c69425094b5e9
SHA105bbe7ec2a7f48129d4fd2a0a0dfbed80ce242e9
SHA256549d25cd481ab63454890f62b68361251b8a92c38ec772826b27193ebddfa39b
SHA512d8143682de33517b943d5916a247e40aa10206f5312a28a90868872d3b16969ebb16df9f77a81bb25b02cc39367c0c0fcf0c1c3970839419e7012afbfdd014ed
-
Filesize
148KB
MD54fb9addbf9fde39aec14a24287b8efd4
SHA14c7baabc200c29c74921639732eb4f210938e883
SHA256de31ee333fca8ce938152825da21ef19e77f88caa504766f7ffdb6f3ddf539fa
SHA512757862d1ddfd43f92d0051ba34ac3f04bd0afde930663adc7b57f33f6e96249b35329698711516ebc1f7130a284cf4513e1bde29e5df575a748851ca65cefbdd
-
Filesize
148KB
MD54fb9addbf9fde39aec14a24287b8efd4
SHA14c7baabc200c29c74921639732eb4f210938e883
SHA256de31ee333fca8ce938152825da21ef19e77f88caa504766f7ffdb6f3ddf539fa
SHA512757862d1ddfd43f92d0051ba34ac3f04bd0afde930663adc7b57f33f6e96249b35329698711516ebc1f7130a284cf4513e1bde29e5df575a748851ca65cefbdd