Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe
Resource
win10v2004-20220812-en
General
-
Target
205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe
-
Size
44KB
-
MD5
53347750d5a9bc0269a74633ff2e35a0
-
SHA1
443178184b1ba46f869d2956005e44d8cd89ebf6
-
SHA256
205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857
-
SHA512
f9f85d9143f11f060d277da75a96936e40623357cbf315b5334250a18f163803da8d09648a8618ff541be28615d8f023529301eb1d6ed137a29e408781789ee0
-
SSDEEP
384:/TevZce/+Pje/KLe/Le/tfF15m7T9P6xOFsiNm2XB/4251re/tfF17e/7e/KCe/e:/Cx9fvq5n0p/tNm2XBwOS5nC6mG
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Symantec\LiveUpdate\LUALL.EXE 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe -
Drops file in Windows directory 56 IoCs
description ioc Process File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Desert.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img13.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img14.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp4.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_1080_5sec_MPEG2_HD_15mbps.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Penguins.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Chrysanthemum.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img18.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_1080_5sec_MPEG2_HD_15mbps.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp6.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp2.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Jellyfish.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Lighthouse.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Penguins.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Tulips.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_480p_5sec_6mbps_new.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_480i_5sec_6mbps_new.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\ASPdotNET_logo.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp2.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp3.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\help.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Chrysanthemum.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img13.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img16.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img17.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img17.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\security_watermark.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img18.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_480p_5sec_6mbps_new.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\ASPdotNET_logo.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Koala.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img15.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\security_watermark.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Koala.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp5.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Hydrangeas.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img14.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img15.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp4.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp5.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp6.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Jellyfish.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..lpaper-architecture_31bf3856ad364e35_6.1.7600.16385_none_d99106b927aa7782\img16.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-winsatmediasamples_31bf3856ad364e35_6.1.7600.16385_none_0b34d0642122c1c4\Clip_480i_5sec_6mbps_new.mpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp1.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Desert.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Hydrangeas.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Tulips.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp1.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-photosamples_31bf3856ad364e35_6.1.7600.16385_none_f36e0e659b8042be\Lighthouse.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-ca-component_31bf3856ad364e35_6.1.7601.17514_none_fae061a2e0ae5019\CA-wp3.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe File created \??\c:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Images\help.jpg.exe 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55cb701100557365727300600008000400efbeee3a851a0c55cb702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c8003100000000004455e6b612003230354333387e310000b00008000400efbe4455e6b64455e6b62a0000002e23010000000b00000000000000000000000000000032003000350063003300380037006100640066006500360066006400610064003000330039003200370066003800300034003100300031003300650033003800610034003300640062006100340032003700390030003100640030003800350034003900310031003600320063003200610062006500640033003800350037006c00000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c556577100041646d696e00380008000400efbe0c55cb700c5565772a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55cb70122041707044617461003c0008000400efbe0c55cb700c55cb702a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000004455e6b6102054656d700000360008000400efbe0c55cb704455e6b62a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55ed7210204c6f63616c00380008000400efbe0c55cb700c55ed722a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1452 1980 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe 28 PID 1980 wrote to memory of 1452 1980 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe 28 PID 1980 wrote to memory of 1452 1980 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe 28 PID 1980 wrote to memory of 1452 1980 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe"C:\Users\Admin\AppData\Local\Temp\205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\explorer.exeexplorer 205c387adfe6fdad03927f8041013e38a43dba427901d085491162c2abed3857l2⤵PID:1452
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1908