Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Setup_00.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Setup_00.exe
Resource
win10v2004-20231215-en
General
-
Target
Setup_00.exe
-
Size
1.2MB
-
MD5
d59834b63e2b500a74130c07bb801ce6
-
SHA1
2bb98af8a9f643d4ba1ec1b7166b197526e3c30a
-
SHA256
c3c52be4316da1412f125ed5551a282ca977fb2764ad15074ec3bf91803e8678
-
SHA512
89011e6bffb19121b2751b8cfe777bed8f5e898dcadf764f38d4726eebbbc5889874a7ee5c58ccbb77f268566807626845b815e71b7d7be0fa5d43b06e491ae4
-
SSDEEP
24576:bPkPHxZN84YhACUpsjQ9XaqK/FSCwhSQoQWD7zBNDujvbOHMm:b6ODhAmWK/vXDPfHMm
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Active Setup\Installed Components Explorer.Exe -
Executes dropped EXE 5 IoCs
pid Process 2128 eToro_MusicOasisInstaller.exe 1636 vd.exe 4028 SearchApp.exe 4936 appsetup.exe 780 eToroSetup.exe -
resource yara_rule behavioral4/files/0x0006000000023225-11.dat upx behavioral4/files/0x0006000000023226-31.dat upx behavioral4/memory/4936-33-0x0000000000400000-0x00000000004A2000-memory.dmp upx behavioral4/files/0x0006000000023226-32.dat upx behavioral4/memory/4936-122-0x0000000000400000-0x00000000004A2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Setup_00.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Explorer.Exe File opened (read-only) \??\F: Explorer.Exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral4/files/0x000800000002321b-6.dat autoit_exe behavioral4/files/0x000800000002321b-5.dat autoit_exe behavioral4/files/0x000800000002321b-4.dat autoit_exe behavioral4/memory/4936-122-0x0000000000400000-0x00000000004A2000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4252 780 WerFault.exe 28 -
Checks SCSI registry key(s) 3 TTPs 22 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 Explorer.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 Explorer.Exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Explorer.Exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0927f4bae37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078318" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0be864bae37da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1241655802" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078318" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005d05a5489e56c74eaa6b39ab0831a11f00000000020000000000106600000001000020000000e6efff9d9f6c5c87fc71e36f528e0c7d8a8b9bf7d8d5cd558a02bb42a9ef949e000000000e8000000002000020000000a13bfd4fe8b2d002a141904fa9fedf44727cba125455c819232c6bafc6f2dab920000000fb1e7ca712b3addb287191a98695d67f3aafd74cafbb6155d3642369dfbceb35400000004e091de573371f3c362e7769cfb664688045c3eb27e8a7d71145984ea30c0d34713492faf9aa200e107ade5e6ea299b6c7f77d00ff4c51330c724f4b766d2558 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078318" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005d05a5489e56c74eaa6b39ab0831a11f00000000020000000000106600000001000020000000072b8cabb0cdbf46555f410c4047add8a4fa050b9cb2ee14622631b55855f5e4000000000e8000000002000020000000341ee997795e58e71dbbc2816c06a6b2b75d0f931e0dfdd1a8ec7f96a47b3abe200000000b7a6b00dd240d233d48eba37c67b574cdb71eb142cef9879c1c34e975614a60400000007ab0ef3104f4154667ea591a827c1cb93f6a3a0bddad5618cfa7a5d80cbb913f72c1030975247bd818f93b419e4c72618d1c6e599c075350ac110fb8399569c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078318" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410327408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74414D14-A3A1-11EE-8184-4ECC77D3B663} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1232749526" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1232749526" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1241655802" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Explorer.Exe Set value (data) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.Exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eik = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-768304381-2824894965-3840216961-1000\{CAB01B28-6487-4409-ACD2-0B88C078EE23} Explorer.Exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.Exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.Exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 4936 appsetup.exe 4936 appsetup.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe Token: SeShutdownPrivilege 4000 Explorer.Exe Token: SeCreatePagefilePrivilege 4000 Explorer.Exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 4936 appsetup.exe 4936 appsetup.exe 4936 appsetup.exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 1864 iexplore.exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 2128 eToro_MusicOasisInstaller.exe 4936 appsetup.exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe 4000 Explorer.Exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 1208 StartMenuExperienceHost.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 1684 SearchApp.exe 4028 SearchApp.exe 4740 SearchApp.exe 4768 SearchApp.exe 2484 SearchApp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2128 2160 Setup_00.exe 23 PID 2160 wrote to memory of 2128 2160 Setup_00.exe 23 PID 2160 wrote to memory of 2128 2160 Setup_00.exe 23 PID 2128 wrote to memory of 1636 2128 eToro_MusicOasisInstaller.exe 36 PID 2128 wrote to memory of 1636 2128 eToro_MusicOasisInstaller.exe 36 PID 2128 wrote to memory of 1636 2128 eToro_MusicOasisInstaller.exe 36 PID 2128 wrote to memory of 4028 2128 eToro_MusicOasisInstaller.exe 115 PID 2128 wrote to memory of 4028 2128 eToro_MusicOasisInstaller.exe 115 PID 2128 wrote to memory of 4028 2128 eToro_MusicOasisInstaller.exe 115 PID 1636 wrote to memory of 4000 1636 vd.exe 34 PID 1636 wrote to memory of 4000 1636 vd.exe 34 PID 1636 wrote to memory of 4936 1636 vd.exe 27 PID 1636 wrote to memory of 4936 1636 vd.exe 27 PID 1636 wrote to memory of 4936 1636 vd.exe 27 PID 4028 wrote to memory of 780 4028 SearchApp.exe 28 PID 4028 wrote to memory of 780 4028 SearchApp.exe 28 PID 4028 wrote to memory of 780 4028 SearchApp.exe 28 PID 1864 wrote to memory of 2292 1864 iexplore.exe 33 PID 1864 wrote to memory of 2292 1864 iexplore.exe 33 PID 1864 wrote to memory of 2292 1864 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_00.exe"C:\Users\Admin\AppData\Local\Temp\Setup_00.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eToro_MusicOasisInstaller.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eToro_MusicOasisInstaller.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Forextrading.exeForextrading.exe3⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vd.exevd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\appsetup.exe"appsetup.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4936
-
C:\Users\Admin\AppData\Local\Temp\eToroSetup.exe"C:\Users\Admin\AppData\Local\Temp\eToroSetup.exe"1⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 17322⤵
- Program crash
PID:4252
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:5008
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1208
-
C:\Windows\Explorer.Exe"C:\Windows\Explorer.Exe"1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4000
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 780 -ip 7801⤵PID:2972
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4740
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4768
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2484
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SETLANG_EXE_15
Filesize36KB
MD50e2a09c8b94747fa78ec836b5711c0c0
SHA192495421ad887f27f53784c470884802797025ad
SHA2560c1cdbbf6d974764aad46477863059eaec7b1717a7d26b025f0f8fe24338bb36
SHA51261530a33a6109467962ba51371821ea55bb36cd2abc0e7a15f270abf62340e9166e66a1b10f4de9a306b368820802c4adb9653b9a5acd6f1e825e60128fd2409
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer
Filesize36KB
MD5ab0262f72142aab53d5402e6d0cb5d24
SHA1eaf95bb31ae1d4c0010f50e789bdc8b8e3116116
SHA25620a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb
SHA512bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133480360372168813.txt
Filesize42KB
MD5dae8ac8e9f8601711475d3b922cfbc2e
SHA1c3cb9738b4e8e132817b4580586a8c873aa6b28b
SHA256247a3481007bae110191c0abe9bba7731198cc7bfc0949dc665d5b12458e4613
SHA512ac7ac71048777f189e0ef595873194e78ef42c88b88eb774a78a87db7183beb9f2b170ee759487e675106b692bd20ee95ae21566d8a1f8954a43c377b626784f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133480360441345573.txt
Filesize74KB
MD5c09e63e4b960a163934b3c29f3bd2cc9
SHA1d3a43b35c14ae2e353a1a15c518ab2595f6a0399
SHA256308deca5e1ef4d875fbe0aff3ce4b0b575b28e643dffda819d4390ec77faf157
SHA5125ca3321034dff47e3afe0b0bdfaffc08782991660910a29375a8e0363794b78247282aba65dbd882ae225aa140ae63927dfd0946a441ee6fa64a1d8c146777b9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\UA6WZR2N\microsoft.windows[1].xml
Filesize96B
MD5b97f6e2cc1520a2e8426851cb68f3b0f
SHA133a930fe90facb202ec3cd87ca0275af9dd20155
SHA256a3546f0c8e475abc90346821be3c3d67f522161ea876c3d14247ba6d79a2b5aa
SHA5129b3771942ffce17a52d4c0598bd0d4bb8f196c8731e5b129524b3d9507d411895e4c43d84479f06e5fb28c3403d6b0ec63b97f3a3cdb598873d17fd637abd06a
-
Filesize
88KB
MD5598f9afd28efe3a5a18c78a446f0de2a
SHA14deee6b34503405ad3ebd397c016a9d3feb87548
SHA256393c880dce25c5d586b31e6b97e07421e0923f2865199be8e762eedf260cd048
SHA5127c6764b70b44fad8a44b21a8c604123e767fa07097ecf5b3b02f29c230a32956abd0009b49c737a62aabffcb36f06e492b3e60e31abccee6384069cc4feb9dd0
-
Filesize
66KB
MD5046d484a9daaa71c115497a20b6f7710
SHA16a57864a95d49e713aa8079fef3d3b63f56404f0
SHA2564ec7624efa9f4c34648cd07b160dca0ac38719082f4f235b224b0496ec278d28
SHA512fe502265c9f03733a0c9a1345aa653b711c7d3e1ee3e4577108c21a7d32cf43d6e5bd69511b3c036dfdf7d342480d972a5890fc2e21146aa41eb0655905eabf9
-
Filesize
64KB
MD5953b746b3f8ce65741184f8426eaa6c8
SHA180e3dbc5c052560ba640b6c3948b0e0108126097
SHA2562a3b34923ef6c28010e7698fc766c6f78df6710436b3c64fcce56ee14d698242
SHA512fdef73af2833ab97202e2ad53b739a76adbe0606da8afe47931319d495f6e5fc3b260cc8baa3918f1c98416db31a10d55a4d5188154080cb51d80ece98fa3a45
-
Filesize
48KB
MD57958ada374854f55e23755d649899255
SHA1d22d13c5cab73853a072920d673eef3c334ca234
SHA2564f28eec99c7c8cd616a9fb89b7f3a580991befe59e38c0b1b678f0c3820baf54
SHA5124e449db1f22ecebda8aca9837da31cb2e81959d3c345aa2686942008cbb794bb6fe0ad149d9c053921bd58875cea6dd098dd67d57402af60f551cfbeb7285bf9
-
Filesize
68KB
MD50384c2fd3da1561307ed90feb4a3354a
SHA16cf354ebd4072289e01671268e0af93de507a5f8
SHA256dd14d9f791bdce9f088d62a2dc1af19479acd953a99980088c58b8ac80770d95
SHA512cf8f83a74e949adadd1922cd8a9a77467a1b10603f23edbca30300177864357790026f22a8699a32b4373dc19919c039a1a13f769cc3e0c8b31186367705be02
-
Filesize
78KB
MD5a8b99d92d616bf1d6983e389e769c8ad
SHA1f955af82ce4dba4f180255d2119f7efdb672c4c6
SHA25653747ccf95149df2a34e77669ba75e71e60121d7006951408e0843dd6faa8b86
SHA51272afa4fbb5f89814197fb2b632d61f3f4deb54b8ba421f31e8ad732f21bc5013ca193af36cdaf0f2e83e6b518e5ae956b6603bedd3126d409ff63cfa5756d0b7
-
Filesize
71KB
MD5f3a3190d7adeac3483de17734f78f1bb
SHA1b296c887532729c920fb8772877e1f135706a34e
SHA25653bc2736e0198549901d6c93faa4b709ac6e2d517f7549c7195cb17011fa09ed
SHA5123206a5f7aaec7300f3d128551e17bc3b5221c1146f2dd888e4b7a9f54089159d7b0b28a1134d4d1d412201439ab57fd51ab48734a3808834560bab9b247457c3
-
Filesize
50KB
MD55e9015cf5ded25fa0e03f67d4d6e472e
SHA1db44fdea94feae4a3df03d6ca966aeef86a9557e
SHA2565ba4b4e98cc0f75e94c2f9e24ad0ce1be23c0d9ac0a022b90b96c8d304a4608a
SHA5125e18f2948e984c61db186a16621c303338a10f733050b5362b5539c6b04a5e1e51a1f64553f2f7d00d40326e4e7a3b94d0f65a27a0561991c93490a026d4693b
-
Filesize
76KB
MD54f372dff70949fa331d5ae41fa2f0a8c
SHA187fa0451654e2187ee343074f7c2b909ad99f61a
SHA2565f1de230e4d46dbcc2936b8f3fdcc2dd897ab56ae95e0de9e7975d1b72271861
SHA512e4427b41ef3b25427ae624f7224f4761b604d71a587cbe595df3329c485802ab5fdce597428ba385206452bb60111e25386f9b787b7b76f49767c7a2c966b861
-
Filesize
72KB
MD55189c15387de17b627765ac3d8c9f34b
SHA1e90de0b2158b02ef345b8bc3904a6eca1ee4a520
SHA256a3d51693013624959c979dd4bcb6f7b84b0767294ac74463361eb47f39e125ac
SHA51276138e0493f533f5654445a3999721935ad22613319f03b06146af609e987ba75839e663588878fcaa516e60915ff3677cdb1d8587655bcb287caff17f1a2ebd
-
Filesize
53KB
MD5c71de96291d736f7e8bbdfba52faa0c9
SHA126da1aa80c9d1e75e3cddd21afb2ffc4029027fd
SHA256a13d2847dab7c8d59563387f7ea09b3664abd43caf8ebb4d577a7e924f16037f
SHA5123a6755325c8d72e902eaa60e70b2a230d25bde5873823c8429d00b3ddbd702e9edc3f452ba1121b0378bf74bfbd49a38f8353aa23b9bf3b6975a57a56412e689
-
Filesize
53KB
MD5a09b20387847019bdb827e2581a547dc
SHA157b21efb20ab2f9610a1cb115283ac1cb70c2b8a
SHA256f7dd2c1bc7987fdb20f84c957cbd79b049a91719c345991642868ae93d256cda
SHA512cdc9b7894f8a13c1f474ccaba67c2fd1223d49cb4b872efed0ffbdc2a36411279d4a44d680a23caf013e44c0dc3699ef0df47577580e9471de680893cc3b1e9e