Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe
Resource
win10v2004-20220812-en
General
-
Target
ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe
-
Size
44KB
-
MD5
05fa86662eab33c61a25d24d00c2012c
-
SHA1
449b21e77e2f0400d59ec987cca4e70a0a4eca5f
-
SHA256
ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed
-
SHA512
7d0adbeab758c6db6574bb9e3c29090594917eecbd1008b9b06b568e448afeaba6d911ffd1e31e14ae4291275c132036d9a72bb964f734108559a31b041b941c
-
SSDEEP
384:/TevZce/+Pje/KLe/Le/tfF15m7T9P6xOFsiNm2XB/4251re/tfF17e/7e/KCe/0:/Cx9fvq5n0p/tNm2XBwOS5nC6ms
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Symantec\LiveUpdate\LUALL.EXE ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\help.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img21.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img23.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..l-wallpaper-windows_31bf3856ad364e35_6.1.7600.16385_none_370717dbca22c586\img0.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Tanspecks.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\darkBlue_GRAD.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img19.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img19.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img24.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-e..ebargadgetresources_31bf3856ad364e35_6.1.7600.16385_none_88767a95b8bbf001\default_thumb.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img23.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Pine_Lumber.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Small_News.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\White_Chocolate.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\security_watermark.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Maid with the Flaxen Hair.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Sleep Away.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img20.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Psychedelic.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Sand_Paper.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img20.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\ASPdotNET_logo.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp1.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp4.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Notebook.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Pine_Lumber.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\security_watermark.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..l-wallpaper-windows_31bf3856ad364e35_6.1.7600.16385_none_370717dbca22c586\img0.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Blue_Gradient.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Monet.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Monet.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\help.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-e..ebargadgetresources_31bf3856ad364e35_6.1.7600.16385_none_88767a95b8bbf001\default_thumb.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp2.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp3.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp6.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Maid with the Flaxen Hair.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Sleep Away.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img22.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Psychedelic.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp5.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Blue_Gradient.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\topGradRepeat.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp2.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp3.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp5.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp6.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img22.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Notebook.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Pretty_Peacock.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Small_News.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\Images\ASPdotNET_logo.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp1.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-m..ttheme-us-component_31bf3856ad364e35_6.1.7601.17514_none_b52573ad8e4c2d89\US-wp4.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Pretty_Peacock.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Sand_Paper.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\Tanspecks.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-tabletpc-journal_31bf3856ad364e35_6.1.7601.17514_none_75d78dc0bb37c026\White_Chocolate.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Kalimba.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img21.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File created \??\c:\Windows\winsxs\amd64_microsoft-windows-musicsamples_31bf3856ad364e35_6.1.7600.16385_none_06495209cbd8e93b\Kalimba.mp3.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-s..allpaper-characters_31bf3856ad364e35_6.1.7600.16385_none_bde0eaed84920a21\img24.jpg.exe ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55cb70122041707044617461003c0008000400efbe0c55cb700c55cb702a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55ed7210204c6f63616c00380008000400efbe0c55cb700c55ed722a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a0031000000000081552605102054656d700000360008000400efbe0c55cb70815526052a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c55f57b100041646d696e00380008000400efbe0c55cb700c55f57b2a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55cb701100557365727300600008000400efbeee3a851a0c55cb702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c8003100000000008155260512004341373043437e310000b00008000400efbe81552605815526052a0000003e31010000000a00000000000000000000000000000063006100370030006300630038003500360061006100650063006100340066006500640035003100630032003300630034003500390037006400610065006300610061006400610061003800370037006100370033003900650061003400630039006400330030006300370065003500360065003200330065003000650064006c00000018000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 576 ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 576 wrote to memory of 980 576 ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe 28 PID 576 wrote to memory of 980 576 ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe 28 PID 576 wrote to memory of 980 576 ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe 28 PID 576 wrote to memory of 980 576 ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe"C:\Users\Admin\AppData\Local\Temp\ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0ed.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\explorer.exeexplorer ca70cc856aaeca4fed51c23c4597daecaadaa877a739ea4c9d30c7e56e23e0edl2⤵PID:980
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1732