Analysis
-
max time kernel
101s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 16:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20231222-en
General
-
Target
file.exe
-
Size
222KB
-
MD5
11ac7990dacb8fed9a583f69660a8310
-
SHA1
a891612189e2db49a16704a9ac08850c5a76be3d
-
SHA256
b6d7d2ab6d7e66ba154aac8266fd5e0f6667c11d3cc682b241da586a5577581a
-
SHA512
7613b538549467fb21b3d3a4c25c82a6ab44a384b832efc6cd420b32083bf81e4563f4e558cf316532cc7d8fed68f5d232c9bfeb4335230e8c6db20c036a20d5
-
SSDEEP
3072:yKSFP/aG5wOG9vlyLfniPI4JSzjEz5MXzHuSgAChOrFgjaaSpGq/B:y5FPyrs/iKzeMXPVh9p7
Malware Config
Extracted
smokeloader
pub1
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdpo
-
offline_id
Bn3q97hwLouKbhkQRNO4SeV07gjdEQVm8NKhg0t1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-FCWSCsjEWS Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0844OSkw
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
45.15.156.60:12050
Extracted
amadey
4.17
http://185.196.10.34
-
install_dir
eff1401c19
-
install_file
Dctooux.exe
-
strings_key
6e23b5eadc27bb0b2eaebdd4fed1beb2
-
url_paths
/b8sdjsdkS/index.php
Signatures
-
Detect ZGRat V1 23 IoCs
Processes:
resource yara_rule behavioral2/memory/4284-103-0x0000000004F10000-0x0000000004FDA000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-105-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-104-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-107-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-109-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-111-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-113-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-123-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-125-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-121-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-119-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-117-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-115-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-127-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-129-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-131-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-135-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-133-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-137-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-139-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/4284-141-0x0000000004F10000-0x0000000004FD3000-memory.dmp family_zgrat_v1 behavioral2/memory/3476-2162-0x00000264EE960000-0x00000264EEA9C000-memory.dmp family_zgrat_v1 behavioral2/memory/3820-3106-0x000001F97F8B0000-0x000001F97F9B2000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 10 IoCs
Processes:
resource yara_rule behavioral2/memory/404-28-0x0000000002190000-0x00000000022AB000-memory.dmp family_djvu behavioral2/memory/3776-29-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3776-31-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3776-32-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3776-33-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/3776-43-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/948-49-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/948-50-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/948-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/5080-47-0x00000000005F0000-0x000000000068D000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3796-72-0x0000000000400000-0x0000000000454000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry 2 TTPs 6 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
C600.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation C600.exe -
Deletes itself 1 IoCs
Processes:
pid process 3488 -
Executes dropped EXE 10 IoCs
Processes:
AA98.exeC600.exeC600.exeC600.exeC600.exeD738.exeF408.exe4C5A.exe4C5A.exe4C5A.exepid process 1800 AA98.exe 404 C600.exe 3776 C600.exe 5080 C600.exe 948 C600.exe 2400 D738.exe 4616 F408.exe 4284 4C5A.exe 4012 4C5A.exe 1184 4C5A.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
C600.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e413230b-f7c4-4632-89d9-5d59f67772cc\\C600.exe\" --AutoStart" C600.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 12 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 api.2ip.ua 30 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
C600.exeC600.exeF408.exe4C5A.exedescription pid process target process PID 404 set thread context of 3776 404 C600.exe C600.exe PID 5080 set thread context of 948 5080 C600.exe C600.exe PID 4616 set thread context of 3796 4616 F408.exe RegAsm.exe PID 4284 set thread context of 1184 4284 4C5A.exe 4C5A.exe -
Drops file in Windows directory 1 IoCs
Processes:
4C5A.exedescription ioc process File created C:\Windows\Tasks\Dctooux.job 4C5A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 516 948 WerFault.exe C600.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeexplorer.exeexplorer.exeAA98.exeexplorer.exeexplorer.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AA98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 -
Processes:
SearchApp.exeSearchApp.exeSearchApp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
Processes:
StartMenuExperienceHost.exeSearchApp.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeStartMenuExperienceHost.exeSearchApp.exeSearchApp.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{F1A22816-7772-4806-A738-190E8BC2B9DC} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{57D09FF7-050C-4FC1-A514-D9C280D3678D} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{AF81CD2C-A49B-4A5A-960F-4D6CC4D37083} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3803511929-1339359695-2191195476-1000\{E328C71B-C392-4825-B55F-995FAD32B4B2} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "23" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exepid process 4848 file.exe 4848 file.exe 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 3488 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
file.exeAA98.exepid process 4848 file.exe 1800 AA98.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
RegAsm.exe4C5A.exeexplorer.exeexplorer.exedescription pid process Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeDebugPrivilege 3796 RegAsm.exe Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeDebugPrivilege 4284 4C5A.exe Token: SeShutdownPrivilege 3488 Token: SeCreatePagefilePrivilege 3488 Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3700 explorer.exe Token: SeCreatePagefilePrivilege 3700 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe Token: SeShutdownPrivilege 3552 explorer.exe Token: SeCreatePagefilePrivilege 3552 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
explorer.exeexplorer.exepid process 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exepid process 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3700 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3552 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 explorer.exe 3628 3628 3628 3628 3628 3628 3628 3628 3628 3628 3628 3628 3628 2500 explorer.exe 2500 explorer.exe 2500 explorer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
StartMenuExperienceHost.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeSearchApp.exeStartMenuExperienceHost.exeSearchApp.exepid process 4888 StartMenuExperienceHost.exe 4872 StartMenuExperienceHost.exe 2216 SearchApp.exe 644 StartMenuExperienceHost.exe 756 SearchApp.exe 4116 StartMenuExperienceHost.exe 4520 SearchApp.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
C600.exeC600.exeC600.exeF408.exe4C5A.exedescription pid process target process PID 3488 wrote to memory of 1800 3488 AA98.exe PID 3488 wrote to memory of 1800 3488 AA98.exe PID 3488 wrote to memory of 1800 3488 AA98.exe PID 3488 wrote to memory of 404 3488 C600.exe PID 3488 wrote to memory of 404 3488 C600.exe PID 3488 wrote to memory of 404 3488 C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 404 wrote to memory of 3776 404 C600.exe C600.exe PID 3776 wrote to memory of 3352 3776 C600.exe icacls.exe PID 3776 wrote to memory of 3352 3776 C600.exe icacls.exe PID 3776 wrote to memory of 3352 3776 C600.exe icacls.exe PID 3776 wrote to memory of 5080 3776 C600.exe C600.exe PID 3776 wrote to memory of 5080 3776 C600.exe C600.exe PID 3776 wrote to memory of 5080 3776 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 5080 wrote to memory of 948 5080 C600.exe C600.exe PID 3488 wrote to memory of 2400 3488 D738.exe PID 3488 wrote to memory of 2400 3488 D738.exe PID 3488 wrote to memory of 2400 3488 D738.exe PID 3488 wrote to memory of 4616 3488 F408.exe PID 3488 wrote to memory of 4616 3488 F408.exe PID 3488 wrote to memory of 4616 3488 F408.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 4616 wrote to memory of 3796 4616 F408.exe RegAsm.exe PID 3488 wrote to memory of 4284 3488 4C5A.exe PID 3488 wrote to memory of 4284 3488 4C5A.exe PID 3488 wrote to memory of 4284 3488 4C5A.exe PID 4284 wrote to memory of 4012 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 4012 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 4012 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe PID 4284 wrote to memory of 1184 4284 4C5A.exe 4C5A.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4848
-
C:\Users\Admin\AppData\Local\Temp\AA98.exeC:\Users\Admin\AppData\Local\Temp\AA98.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1800
-
C:\Users\Admin\AppData\Local\Temp\C600.exeC:\Users\Admin\AppData\Local\Temp\C600.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\C600.exeC:\Users\Admin\AppData\Local\Temp\C600.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e413230b-f7c4-4632-89d9-5d59f67772cc" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\C600.exe"C:\Users\Admin\AppData\Local\Temp\C600.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\C600.exe"C:\Users\Admin\AppData\Local\Temp\C600.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 5685⤵
- Program crash
PID:516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 948 -ip 9481⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\D738.exeC:\Users\Admin\AppData\Local\Temp\D738.exe1⤵
- Executes dropped EXE
PID:2400
-
C:\Users\Admin\AppData\Local\Temp\F408.exeC:\Users\Admin\AppData\Local\Temp\F408.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
C:\Users\Admin\AppData\Local\Temp\4C5A.exeC:\Users\Admin\AppData\Local\Temp\4C5A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\4C5A.exeC:\Users\Admin\AppData\Local\Temp\4C5A.exe2⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\4C5A.exeC:\Users\Admin\AppData\Local\Temp\4C5A.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1184
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3700
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4888
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3552
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:3628
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4872
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2216
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:2500
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:644
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:756
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:4752
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4116
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4520
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
PID:4016
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3760
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3448
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1996
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2188
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\eff1401c19\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\eff1401c19\Dctooux.exe1⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\eff1401c19\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\eff1401c19\Dctooux.exe2⤵PID:744
-
C:\Users\Admin\AppData\Roaming\1000008000\Oscrcelw.exe"C:\Users\Admin\AppData\Roaming\1000008000\Oscrcelw.exe"3⤵PID:3476
-
C:\Users\Admin\AppData\Roaming\1000008000\Oscrcelw.exeC:\Users\Admin\AppData\Roaming\1000008000\Oscrcelw.exe4⤵PID:3820
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe5⤵PID:4268
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe6⤵PID:3412
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=507⤵PID:4436
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1968
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4032
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1236
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2128
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:964
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3760
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4996
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3700
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2176
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2144
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4244
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4364
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4028
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4896
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4272
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD513257e40f392766b28ca260a1a7e304a
SHA1e1965dd778bf9ab13f58b32952b0a28b12109370
SHA2563382cb26f535244e0fc99b96966948b9aaa9081662960038527dbfb64fcc5644
SHA512fd2e4809cd2eb83bc83d4c18edd64ae2cb4c3324541220c15fb5a2cd96ad90771f82e2efbebd5452372830d610f2abd2cdf77f49c62c545cb31b52d67e768551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD553b90d69269bd54c1a6d2b6ddb985144
SHA1027ed73fbf13c1704cbf70dcbcc4c5e0b3718951
SHA256ac56b738b6f879c30c2a02bd0ed956decfd002223d10e17541e89ba7a03fed86
SHA51267e5dbd165c6905eb88d241f3bbb89474d3ef1238c6db7dea5791364025db9f26fd17f588d707075118b5ea6960d20b50f0d201f5757468574cf3138252fb3c9
-
Filesize
1KB
MD59f5d0107d96d176b1ffcd5c7e7a42dc9
SHA1de83788e2f18629555c42a3e6fada12f70457141
SHA256d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097
SHA51286cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
Filesize2KB
MD574ae400fc5370a0f4c3f9ff0262a6a66
SHA13cba1fc7a5c3886c643b82d206eac82559667e93
SHA256a0c96c8b4e377b7859da978950a579e9de78510b2e6e5d37a2fe996146792a02
SHA512b3506eb7626e17d8b3429993b11532dc4f7695d2bc5d82b1a07f34e2b0048ea74da5f33af02b8377a09a8b8d6bc18d19defc1655cbbeaf55040f3b33fe0ead9a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\BHN90SAO\microsoft.windows[1].xml
Filesize97B
MD5a49784c6007e88174d13fd2a1d1603c8
SHA196351722a846ad8a396b7cd3285ac30a8edf3768
SHA256bf97a280596c60fa7130725b7426e7cd5ccfb759c909b5ef0b1575df2654ca91
SHA512b0c5f6550c560e3bee33be9261bee95a006cd63a57d56b3a4b6c3c8f9ca2c6f222bfd2e8933e663f4b644457b48eb638160c8b9a6814b47a3fd4760f74f825ec
-
Filesize
763KB
MD514f7c4b98e2c837e555d030bfbe740c4
SHA1695e50ac70754d449445343764d8a0c339323a04
SHA256585892aac1dd2104c9dc5badf75efbc0d5f363456c084741af5e251402473de0
SHA512c72065546378ea95362d370b6e5fe6aa75e197c2a156193057f6ffe0f4c010ad3a2d7b6d024b02f7aee91b97dd6740833911107bcdb8a7fae2316e0ef8228cc5
-
Filesize
75KB
MD5ab7ad3f6a59eb9c2972bde55c503f104
SHA19a3c35f244f68ee92f8af3a44fa2416219cc28fa
SHA256f3125a40cbf547a112a3dff1391d2f5825d11fef5c3ffeb95bb8fa7a7f2196f9
SHA51221258d00f64e2a56f95877021ee63d3f44df1b346daf04a49af08bdc408ad79bcb857b384a292df99b11b8061ad5f6a596a450ac2237ec10aaca5715d9acf23b
-
Filesize
222KB
MD511ac7990dacb8fed9a583f69660a8310
SHA1a891612189e2db49a16704a9ac08850c5a76be3d
SHA256b6d7d2ab6d7e66ba154aac8266fd5e0f6667c11d3cc682b241da586a5577581a
SHA5127613b538549467fb21b3d3a4c25c82a6ab44a384b832efc6cd420b32083bf81e4563f4e558cf316532cc7d8fed68f5d232c9bfeb4335230e8c6db20c036a20d5
-
Filesize
750KB
MD5fb41f20c1783dee1ff3ff24e9320ef44
SHA1873e409ee8fd52a51031269bee1b5e56207b8cf8
SHA2563f8c53cc5aff0effc748241349db40bff4d9c3004b557c091c00ed192d8f4226
SHA512b83682f64c79dab3ac134a2f42fa111882a6e7555d59b112599953a532091e67b76a1fd0da3426e516912c3e650ebed79d0bdc0ba9b4317f0bfb341e0b4cd481
-
Filesize
386KB
MD58dba338c06d56581dee846ccd53f0109
SHA14e534d89a96ceb74409e819b2fd8a4e58f0e4cd7
SHA256235178b7c347f6f244d0a1d1fdb43fa11d9c70e2aeec4841329b790775e9f25d
SHA512a1c2da8a3b9d7f17e9991fa11d75b2386684e2f13b162b88a337c3ccb0b64b34568658e8511871fb227398a4bd9a98bf79f40209dc6781180ddd627847746f7c
-
Filesize
3.2MB
MD561ffa6120e8b47f583e6736560fa9bfe
SHA1379187ce638c4750a1ae5c41be80008ee4efd382
SHA256cc2d8a9ce9e760e5f7475a6de88cbfb1fed33d6027719ec81282928558584ac0
SHA512dac3e9b2dd689534867fe3900f08e28aee7baf1f706cee3dffe6a6f6286c4c5e1810bfcabc66edd9faa6fbe6bc2a67b63c1ed86461c156cc68fd471dc276174c
-
Filesize
2.0MB
MD55a4a32c07036e786713312d80a52b259
SHA12521585a81bcebc08fc554f722eae1d38084c1aa
SHA256a6e89555a92c980aa22d40dccee8cd92f89a17961edaf8265a2f5674882941d1
SHA5123b1438bbff230d1dd98d9b67b100a455ddc6666396e756afe92ac30188298273bb856fda6fac8d50d9851c9b9d31b72704aa0d5bab2825e9fe6e2895ac1e6e0d
-
Filesize
380KB
MD5d9ec192c82b59ae4dfae55218b19530f
SHA1d7170975baf5f27ea0591a33f45cddb63574ac94
SHA25652c5799b3c93ca11e9953e8a5712a82dd08b6cb0c17ff90cb1d2cb104411e7d4
SHA5127ed6906f71ac045b2a4732935995abdfde68d88fe6041b19f114dfb95fb943450d5cbfbf1d185d3a2febb29c7d3493b9c1247a84925a5e7af41e1c710cc77838
-
Filesize
1.2MB
MD5302ac1d64dabebfeb1ecb1ddbd1f46b0
SHA13b44fc274eeb6b20282586f478ead732cfc74ddf
SHA256003552c7c95845ab8bd7638e9c3365607701aff4d82220154debf9f8559171ee
SHA512d6a6d54f66603aea20d8af271f406ca164a441d43baff316fb0f986fbb95416238484a79ffe740de5689e829716dac078fad4225bc74bb433c1d2e61e6d4cb2f
-
Filesize
655KB
MD59f01aca00fd7b1db452df405fea48671
SHA1e947fc28643137185036e683c7a5f620671e9078
SHA256cce3cdb55271d1eea08bb1cbffaf49e6a570b52cc7aa06762db29e38b90e25d3
SHA51239d0986a4bf02f376d1f3d7d7eebe6aaaf85cff3ea2bf56da8f686522ef2786b23cc37ed0af7ff2f9e5fa01829bd811a056cefd82c49e421d79c867c9e2215b3