Analysis

  • max time kernel
    114s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 02:26

General

  • Target

    ede23ecbadfea175ccb8a7011a896b780d6e5fc1400fffcbbc95509a7137587e.exe

  • Size

    3.6MB

  • MD5

    777230b8ab5038f787d8c0a4b850e55c

  • SHA1

    89c831e4265c9a9d7ee5848433ee4fe2715cd99b

  • SHA256

    ede23ecbadfea175ccb8a7011a896b780d6e5fc1400fffcbbc95509a7137587e

  • SHA512

    a38d2d9f5d08e65b17c0dfe6e633b0168003ece8ec530a7b35e145e8be472ab3d5451d1ed68c8da671db2b5cfe14131d45f9e86448f04c6a4a43636daf212ce2

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlkUVD+j6BxhitGedG/Hg5167/+Lz+:c+8X9G3vP3AM5VxLitGgG/Hg516+z+

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ede23ecbadfea175ccb8a7011a896b780d6e5fc1400fffcbbc95509a7137587e.exe
    "C:\Users\Admin\AppData\Local\Temp\ede23ecbadfea175ccb8a7011a896b780d6e5fc1400fffcbbc95509a7137587e.exe"
    1⤵
      PID:4748
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2320
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:60
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2392
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3652
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:716
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2288
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4472
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4836
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3484
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4600
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3584
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:2768
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:4800
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:3792
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:4052
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:3384
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:4668
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:2768
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3852
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3536
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:4244
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4680
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:184
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:3996
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:4632
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:1972
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:3344
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:2976
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:4396

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                          Filesize

                                          471B

                                          MD5

                                          0085711bef17acad9eacf0bbf9bf3906

                                          SHA1

                                          20041eb81473c406da0ebfd7717231c0852ba344

                                          SHA256

                                          98c31705ae2dbde79cc8916db28c40c875597004ae24d94ac42433e0989d70a1

                                          SHA512

                                          3354239703701d843124bc466fd9794dd65ed766e4a1df64f784250292be3f24239a9e7156738d07a1c12316952cc1ee71ae9feba9b8fdbfb545e273ae871a6e

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                          Filesize

                                          302B

                                          MD5

                                          2cddcfd2e7ef61191081490a43cd1f61

                                          SHA1

                                          7ae690c111aa9b534715da851b1d41e2059d03f3

                                          SHA256

                                          60436e3be0a3fc8dad012905b878fb675504d962e68e39183a909bc0061fa22a

                                          SHA512

                                          951d5ccd8c3b6b532d8027bc66d7746cc96f4586deb6c14622da7bf069446132b5b03d3ce850982d4ae2e7b39d1be68189747c397305fc03935f01131f574633

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                          Filesize

                                          412B

                                          MD5

                                          c7f25f61a507a948b8ca7e7135feb2a4

                                          SHA1

                                          3cb4a0fd17843740deec7b560198715dec755b97

                                          SHA256

                                          72ce3486fe7ad38abad8906b75a5e374e97691a0cc8a10db4865f073689dea89

                                          SHA512

                                          7c4572fc70996cdee6c78bb6e4eb0b319f66310abe8c9e4a270beab4ac8e546c4ed81ce22e953d22a110c4f95d6f8e40f7df41f8852a0d8af7976b4807ea6b65

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133414648309723365.txt

                                          Filesize

                                          75KB

                                          MD5

                                          62d81c2e1e8b21733f95af2a596e4b18

                                          SHA1

                                          91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                          SHA256

                                          a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                          SHA512

                                          c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133414648309723365.txt

                                          Filesize

                                          75KB

                                          MD5

                                          62d81c2e1e8b21733f95af2a596e4b18

                                          SHA1

                                          91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                          SHA256

                                          a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                          SHA512

                                          c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • memory/184-113-0x0000016534EF0000-0x0000016534F10000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/184-107-0x0000016534A80000-0x0000016534AA0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/184-110-0x0000016534A40000-0x0000016534A60000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1972-132-0x000001F11F480000-0x000001F11F4A0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1972-130-0x000001F11F4C0000-0x000001F11F4E0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1972-136-0x000001F11FAA0000-0x000001F11FAC0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2288-26-0x0000000004680000-0x0000000004681000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2768-76-0x0000000003050000-0x0000000003051000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3344-148-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3536-84-0x000002324A7C0000-0x000002324A7E0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3536-88-0x000002324A780000-0x000002324A7A0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3536-91-0x000002324AB90000-0x000002324ABB0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3584-49-0x00000000046A0000-0x00000000046A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3996-122-0x0000000004820000-0x0000000004821000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4244-100-0x0000000002210000-0x0000000002211000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4396-156-0x0000018607ED0000-0x0000018607EF0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4396-159-0x0000018607E90000-0x0000018607EB0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4396-163-0x0000018E094A0000-0x0000018E094C0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4800-62-0x000001DF6A1A0000-0x000001DF6A1C0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4800-59-0x000001DF69D90000-0x000001DF69DB0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4800-57-0x000001DF69DD0000-0x000001DF69DF0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4836-39-0x000001806DA30000-0x000001806DA50000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4836-36-0x000001806D770000-0x000001806D790000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4836-33-0x000001806D7B0000-0x000001806D7D0000-memory.dmp

                                          Filesize

                                          128KB